Quantum non-malleability and authentication
Christian Majenz
QMATH, University of Copenhagen Joint work with Gorjan Alagic, NIST and University of Maryland CRYPTO 2017, UCSB
24.08.2017
Quantum non-malleability and authentication Christian Majenz QMATH, - - PowerPoint PPT Presentation
Quantum non-malleability and authentication Christian Majenz QMATH, University of Copenhagen Joint work with Gorjan Alagic, NIST and University of Maryland CRYPTO 2017, UCSB 24.08.2017 Motivation: a classical story... Crypto for bank
Christian Majenz
QMATH, University of Copenhagen Joint work with Gorjan Alagic, NIST and University of Maryland CRYPTO 2017, UCSB
24.08.2017
I want a new notebook!
I want a new notebook! Transfer 1000€ to <notebook store>
I want a new notebook! Transfer 1000€ to <notebook store>
I want a new notebook! Transfer 1000€ to <notebook store>
I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>
I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>
I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>
I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>
◮ What cryptographic security notions would fix this problem?
◮ One solution is non-malleable encryption:
◮ One solution is non-malleable encryption:
I want a new notebook!
◮ One solution is non-malleable encryption:
I want a new notebook!
Transfer 1000$ to <notebook store>
◮ One solution is non-malleable encryption:
I want a new notebook!
Transfer 1000$ to <notebook store>
encrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An
◮ One solution is non-malleable encryption:
I want a new notebook!
Transfer 1000$ to <notebook store>
encrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E
◮ One solution is non-malleable encryption:
I want a new notebook!
Transfer 1000$ to <notebook store>
encrypt decrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe
New definition of information-theoretic quantum non-malleability which
New definition of information-theoretic quantum non-malleability which
◮ fixes a vulnerability allowed by the previous definition
New definition of information-theoretic quantum non-malleability which
◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication
New definition of information-theoretic quantum non-malleability which
◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication ◮ serves as a primitive for building quantum authentication
New definition of information-theoretic quantum non-malleability which
◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication ◮ serves as a primitive for building quantum authentication ◮ has both a simulation-based and an entropic characterization
New definition of information-theoretic quantum non-malleability which
◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication ◮ serves as a primitive for building quantum authentication ◮ has both a simulation-based and an entropic characterization
♠ Additional result: The new definition of quantum authentication with key recycling (Garg, Yuen, Zhandry ’16, next talk!) can be fulfilled using unitary 2-designs.
◮ NM first defined in the context of public key cryptography
(Dolev, Dwork, Naor ’95)
◮ NM first defined in the context of public key cryptography
(Dolev, Dwork, Naor ’95)
◮ Simulation-based security definition in terms of relations on
plaintext space
◮ NM first defined in the context of public key cryptography
(Dolev, Dwork, Naor ’95)
◮ Simulation-based security definition in terms of relations on
plaintext space ! NM can be characterized as certain kind of chosen ciphertext indistinguishability (Bellare and Sahai ’99)
◮ NM first defined in the context of public key cryptography
(Dolev, Dwork, Naor ’95)
◮ Simulation-based security definition in terms of relations on
plaintext space ! NM can be characterized as certain kind of chosen ciphertext indistinguishability (Bellare and Sahai ’99)
◮ Information theoretic definition using entropy:
(X, C), ( ˜ X, ˜ C) two plaintext ciphertext pairs, C = ˜ C def: scheme is NM if I( ˜ X : ˜ C|XC) = 0 (Hanaoka et al. ’02)
◮ NM first defined in the context of public key cryptography
(Dolev, Dwork, Naor ’95)
◮ Simulation-based security definition in terms of relations on
plaintext space ! NM can be characterized as certain kind of chosen ciphertext indistinguishability (Bellare and Sahai ’99)
◮ Information theoretic definition using entropy:
(X, C), ( ˜ X, ˜ C) two plaintext ciphertext pairs, C = ˜ C def: scheme is NM if I( ˜ X : ˜ C|XC) = 0 (Hanaoka et al. ’02)
◮ later ≈simulation-based definition (McAven, Safavi-Naini,
Yung ’04)
◮ Classical NM:
◮ Classical NM:
◮ Classical NM:
◮ Classical NM:
◮ Quantum NM:
def: Quantum encryption scheme: (Enck, Deck)
◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A
def: Quantum encryption scheme: (Enck, Deck)
◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A ◮ H ¯ A = HA ⊕ C |⊥
def: Quantum encryption scheme: (Enck, Deck)
◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A ◮ H ¯ A = HA ⊕ C |⊥ ◮ correctness: Deck ◦ Enck = idA
def: Quantum encryption scheme: (Enck, Deck)
◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A ◮ H ¯ A = HA ⊕ C |⊥ ◮ correctness: Deck ◦ Enck = idA ◮ average encryption map: EncK = EkEnck
◮ Recall: classical non-malleability setup
◮ Recall: classical non-malleability setup ◮ add reference system
◮ Recall: classical non-malleability setup ◮ add reference system ◮ allow side info for adversary
◮ Recall: classical non-malleability setup ◮ add reference system ◮ allow side info for adversary
def: effective map on plaintexts and side info ˜ Λ = Ek[Deck ◦ Λ ◦ Enck]
◮ idea: define NM such that Mallory cannot increase her
correlations with the honest parties
◮ idea: define NM such that Mallory cannot increase her
correlations with the honest parties
◮ Unavoidable attack: probabilistically discard the ciphertext
◮ idea: define NM such that Mallory cannot increase her
correlations with the honest parties
◮ Unavoidable attack: probabilistically discard the ciphertext
⇒ only allow the unavoidable attack.
◮ idea: define NM such that Mallory cannot increase her
correlations with the honest parties
◮ Unavoidable attack: probabilistically discard the ciphertext
⇒ only allow the unavoidable attack.
Definition (Quantum non-malleability (qNM))
A scheme Π = (Enck, Deck) is non-malleable, if for all states ρABR and all attacks ΛCB→C ˜
B,
I(AR : ˜ B)σ ≤ I(AR : B)ρ+h(p=(Λ, ρ)), , with σA ˜
BR = ˜
ΛAB→A ˜
B(ρABR).
◮ idea: define NM such that Mallory cannot increase her
correlations with the honest parties
◮ Unavoidable attack: probabilistically discard the ciphertext
⇒ only allow the unavoidable attack.
Definition (Quantum non-malleability (qNM))
A scheme Π = (Enck, Deck) is non-malleable, if for all states ρABR and all attacks ΛCB→C ˜
B,
I(AR : ˜ B)σ ≤ I(AR : B)ρ + h(p=(Λ, ρ)), with σA ˜
BR = ˜
ΛAB→A ˜
B(ρABR).
p=(Λ, ρ) =F(tr ˜
B ΛCB→C ˜ B (|φ+φ+|CC′ ⊗ ρB ),
|φ+φ+|CC′ )2
◮ qNM can be characterized in the simulation picture!
◮ qNM can be characterized in the simulation picture!
Theorem (Alagic, CM)
Let Π = (Enck, Deck) be a quantum encryption scheme. Π is qNM if and only if , where Λ′ and Λ′′ are explicitly given in terms of Λ.
Setup: Alagic, CM Ambainis, Bouda and Winter ’09
Setup: Alagic, CM Ambainis, Bouda and Winter ’09 Simulator: Alagic, CM Ambainis, Bouda and Winter ’09
Setup: Alagic, CM Ambainis, Bouda and Winter ’09 Simulator: Alagic, CM Ambainis, Bouda and Winter ’09 Separating scheme: ABW-NM allows ”plaintext injection” attack, qNM prevents it
! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design
! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)
! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)
◮ non-unitary schemes are interesting, e.g. for authentication.
! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)
◮ non-unitary schemes are interesting, e.g. for authentication.
! qNM ⇒ information theoretic IND
! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)
◮ non-unitary schemes are interesting, e.g. for authentication.
! qNM ⇒ information theoretic IND
◮ qNM serves as primitive for quantum authentication schemes
⇒ last part of the talk
ABW-NM qNM assumes secrecy implies secrecy secure against plaintext injection primitive for authentication
I want a new notebook!
Transfer 1000$ to <notebook store>
encrypt decrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E
◮ First studied by Barnum et al. ’02
◮ First studied by Barnum et al. ’02 ◮ Most used definition by Dupuis, Nielsen and Salvail ’10
◮ First studied by Barnum et al. ’02 ◮ Most used definition by Dupuis, Nielsen and Salvail ’10 ◮ New definition by Garg, Yuen and Zhandry ’16 (next talk):
◮ First studied by Barnum et al. ’02 ◮ Most used definition by Dupuis, Nielsen and Salvail ’10 ◮ New definition by Garg, Yuen and Zhandry ’16 (next talk):
Definition (GYZ Authentication; Garg, Yuen and Zhandry)
Π = (Enck, Deck) is ε-GYZ-authenticating if, for any attack ΛCB→CB′, there exists Λacc
B→ ˜ B such that for all ρAB
Ek
(ρAB)
with Πacc = 1 − ⊥.
◮ GYZ authenticating scheme from 8-designs (GYZ ’16)
◮ GYZ authenticating scheme from 8-designs (GYZ ’16) ◮ Using representation-theoretic analysis:
Theorem (Alagic, CM)
Adding a constant tag to a quantum message and applying a random element from a 2-design provides GYZ authentication.
◮ GYZ authenticating scheme from 8-designs (GYZ ’16) ◮ Using representation-theoretic analysis:
Theorem (Alagic, CM)
Adding a constant tag to a quantum message and applying a random element from a 2-design provides GYZ authentication.
◮ Independently proven by Portmann ’16
◮ GYZ authenticating scheme from 8-designs (GYZ ’16) ◮ Using representation-theoretic analysis:
Theorem (Alagic, CM)
Adding a constant tag to a quantum message and applying a random element from a 2-design provides GYZ authentication.
◮ Independently proven by Portmann ’16 ◮ advantages: shorter keys, nice constructions (Clifford group)
consider pure states and attack isometries (Stinespring)
consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜
B:
ΓV
B→ ˜ B = trCVCB→C ˜ B
consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜
B:
ΓV
B→ ˜ B = trCVCB→C ˜ B
same simulator as used by GYZ, introduced by Broadbent and Wainewright ’16
consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜
B:
ΓV
B→ ˜ B = trCVCB→C ˜ B
same simulator as used by GYZ, introduced by Broadbent and Wainewright ’16 want to bound Ek
kVUk (|ψAB ⊗ |0T) − ΓV |ψAB
2
consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜
B:
ΓV
B→ ˜ B = trCVCB→C ˜ B
same simulator as used by GYZ, introduced by Broadbent and Wainewright ’16 want to bound Ek
kVUk (|ψAB ⊗ |0T) − ΓV |ψAB
2
lemma for U → U ⊗ U
I want a new notebook!
Transfer 1000$ to <notebook store>
I want a new notebook!
Transfer 1000$ to <notebook store> 00000000000000
I want a new notebook!
Transfer 1000$ to <notebook store> 00000000000000
encrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An
I want a new notebook!
Transfer 1000$ to <notebook store> 00000000000000
encrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E
I want a new notebook!
Transfer 1000$ to <notebook store> 00000000000000
encrypt decrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe TO7c2N6qjbBPDLy
I want a new notebook!
Transfer 1000$ to <notebook store> 00000000000000
encrypt decrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe TO7c2N6qjbBPDLy=00000000000000?
I want a new notebook!
Transfer 1000$ to <notebook store> 00000000000000
encrypt decrypt
qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe TO7c2N6qjbBPDLy=00000000000000? No!
Theorem (Alagic, CM)
Adding a constant tag to a quantum message and encrypting it with an qNM scheme achieves DNS-authentication
DNS authentication from qNM schemes via tagging GYZ authentication from 2-designs instead of 8-designs
Current work with Gorjan Alagic and T