Quantum non-malleability and authentication Christian Majenz QMATH, - - PowerPoint PPT Presentation

quantum non malleability and authentication
SMART_READER_LITE
LIVE PREVIEW

Quantum non-malleability and authentication Christian Majenz QMATH, - - PowerPoint PPT Presentation

Quantum non-malleability and authentication Christian Majenz QMATH, University of Copenhagen Joint work with Gorjan Alagic, NIST and University of Maryland CRYPTO 2017, UCSB 24.08.2017 Motivation: a classical story... Crypto for bank


slide-1
SLIDE 1

Quantum non-malleability and authentication

Christian Majenz

QMATH, University of Copenhagen Joint work with Gorjan Alagic, NIST and University of Maryland CRYPTO 2017, UCSB

24.08.2017

slide-2
SLIDE 2

Motivation: a classical story...

slide-3
SLIDE 3

Crypto for bank transfers

slide-4
SLIDE 4

Crypto for bank transfers

I want a new notebook!

slide-5
SLIDE 5

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store>

slide-6
SLIDE 6

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store>

slide-7
SLIDE 7

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store>

slide-8
SLIDE 8

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>

slide-9
SLIDE 9

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>

slide-10
SLIDE 10

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>

slide-11
SLIDE 11

Crypto for bank transfers

I want a new notebook! Transfer 1000€ to <notebook store> Transfer 9888€ to <notebook store>

◮ What cryptographic security notions would fix this problem?

slide-12
SLIDE 12

Non-malleability

◮ One solution is non-malleable encryption:

slide-13
SLIDE 13

Non-malleability

◮ One solution is non-malleable encryption:

I want a new notebook!

slide-14
SLIDE 14

Non-malleability

◮ One solution is non-malleable encryption:

I want a new notebook!

Transfer 1000$ to <notebook store>

slide-15
SLIDE 15

Non-malleability

◮ One solution is non-malleable encryption:

I want a new notebook!

Transfer 1000$ to <notebook store>

encrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An

slide-16
SLIDE 16

Non-malleability

◮ One solution is non-malleable encryption:

I want a new notebook!

Transfer 1000$ to <notebook store>

encrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E

slide-17
SLIDE 17

Non-malleability

◮ One solution is non-malleable encryption:

I want a new notebook!

Transfer 1000$ to <notebook store>

encrypt decrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe

slide-18
SLIDE 18

Summary of Results

New definition of information-theoretic quantum non-malleability which

slide-19
SLIDE 19

Summary of Results

New definition of information-theoretic quantum non-malleability which

◮ fixes a vulnerability allowed by the previous definition

slide-20
SLIDE 20

Summary of Results

New definition of information-theoretic quantum non-malleability which

◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication

slide-21
SLIDE 21

Summary of Results

New definition of information-theoretic quantum non-malleability which

◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication ◮ serves as a primitive for building quantum authentication

slide-22
SLIDE 22

Summary of Results

New definition of information-theoretic quantum non-malleability which

◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication ◮ serves as a primitive for building quantum authentication ◮ has both a simulation-based and an entropic characterization

slide-23
SLIDE 23

Summary of Results

New definition of information-theoretic quantum non-malleability which

◮ fixes a vulnerability allowed by the previous definition ◮ implies secrecy, analogously to quantum authentication ◮ serves as a primitive for building quantum authentication ◮ has both a simulation-based and an entropic characterization

♠ Additional result: The new definition of quantum authentication with key recycling (Garg, Yuen, Zhandry ’16, next talk!) can be fulfilled using unitary 2-designs.

slide-24
SLIDE 24

Non-malleability

slide-25
SLIDE 25

classical non-malleability (NM)

◮ NM first defined in the context of public key cryptography

(Dolev, Dwork, Naor ’95)

slide-26
SLIDE 26

classical non-malleability (NM)

◮ NM first defined in the context of public key cryptography

(Dolev, Dwork, Naor ’95)

◮ Simulation-based security definition in terms of relations on

plaintext space

slide-27
SLIDE 27

classical non-malleability (NM)

◮ NM first defined in the context of public key cryptography

(Dolev, Dwork, Naor ’95)

◮ Simulation-based security definition in terms of relations on

plaintext space ! NM can be characterized as certain kind of chosen ciphertext indistinguishability (Bellare and Sahai ’99)

slide-28
SLIDE 28

classical non-malleability (NM)

◮ NM first defined in the context of public key cryptography

(Dolev, Dwork, Naor ’95)

◮ Simulation-based security definition in terms of relations on

plaintext space ! NM can be characterized as certain kind of chosen ciphertext indistinguishability (Bellare and Sahai ’99)

◮ Information theoretic definition using entropy:

(X, C), ( ˜ X, ˜ C) two plaintext ciphertext pairs, C = ˜ C def: scheme is NM if I( ˜ X : ˜ C|XC) = 0 (Hanaoka et al. ’02)

slide-29
SLIDE 29

classical non-malleability (NM)

◮ NM first defined in the context of public key cryptography

(Dolev, Dwork, Naor ’95)

◮ Simulation-based security definition in terms of relations on

plaintext space ! NM can be characterized as certain kind of chosen ciphertext indistinguishability (Bellare and Sahai ’99)

◮ Information theoretic definition using entropy:

(X, C), ( ˜ X, ˜ C) two plaintext ciphertext pairs, C = ˜ C def: scheme is NM if I( ˜ X : ˜ C|XC) = 0 (Hanaoka et al. ’02)

◮ later ≈simulation-based definition (McAven, Safavi-Naini,

Yung ’04)

slide-30
SLIDE 30

the no-cloning problem

◮ Classical NM:

slide-31
SLIDE 31

the no-cloning problem

◮ Classical NM:

slide-32
SLIDE 32

the no-cloning problem

◮ Classical NM:

slide-33
SLIDE 33

the no-cloning problem

◮ Classical NM:

slide-34
SLIDE 34

the no-cloning problem

◮ Quantum NM:

N

  • C

l

  • n

i n g !

slide-35
SLIDE 35

Quantum symmetric key encryption

def: Quantum encryption scheme: (Enck, Deck)

◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A

slide-36
SLIDE 36

Quantum symmetric key encryption

def: Quantum encryption scheme: (Enck, Deck)

◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A ◮ H ¯ A = HA ⊕ C |⊥

slide-37
SLIDE 37

Quantum symmetric key encryption

def: Quantum encryption scheme: (Enck, Deck)

◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A ◮ H ¯ A = HA ⊕ C |⊥ ◮ correctness: Deck ◦ Enck = idA

slide-38
SLIDE 38

Quantum symmetric key encryption

def: Quantum encryption scheme: (Enck, Deck)

◮ classical uniformly random key k ◮ encryption map (Enck)A→C, decryption map (Deck)C→ ¯ A ◮ H ¯ A = HA ⊕ C |⊥ ◮ correctness: Deck ◦ Enck = idA ◮ average encryption map: EncK = EkEnck

slide-39
SLIDE 39

Setup for q-non-malleability

◮ Recall: classical non-malleability setup

Alice Bob Mallory

slide-40
SLIDE 40

Setup for q-non-malleability

◮ Recall: classical non-malleability setup ◮ add reference system

Alice Bob Mallory

slide-41
SLIDE 41

Setup for q-non-malleability

◮ Recall: classical non-malleability setup ◮ add reference system ◮ allow side info for adversary

Alice Bob Mallory

slide-42
SLIDE 42

Setup for q-non-malleability

◮ Recall: classical non-malleability setup ◮ add reference system ◮ allow side info for adversary

def: effective map on plaintexts and side info ˜ Λ = Ek[Deck ◦ Λ ◦ Enck]

Alice Bob Mallory

slide-43
SLIDE 43

New definition

◮ idea: define NM such that Mallory cannot increase her

correlations with the honest parties

slide-44
SLIDE 44

New definition

◮ idea: define NM such that Mallory cannot increase her

correlations with the honest parties

◮ Unavoidable attack: probabilistically discard the ciphertext

slide-45
SLIDE 45

New definition

◮ idea: define NM such that Mallory cannot increase her

correlations with the honest parties

◮ Unavoidable attack: probabilistically discard the ciphertext

⇒ only allow the unavoidable attack.

slide-46
SLIDE 46

New definition

◮ idea: define NM such that Mallory cannot increase her

correlations with the honest parties

◮ Unavoidable attack: probabilistically discard the ciphertext

⇒ only allow the unavoidable attack.

Definition (Quantum non-malleability (qNM))

A scheme Π = (Enck, Deck) is non-malleable, if for all states ρABR and all attacks ΛCB→C ˜

B,

I(AR : ˜ B)σ ≤ I(AR : B)ρ+h(p=(Λ, ρ)), , with σA ˜

BR = ˜

ΛAB→A ˜

B(ρABR).

slide-47
SLIDE 47

New definition

◮ idea: define NM such that Mallory cannot increase her

correlations with the honest parties

◮ Unavoidable attack: probabilistically discard the ciphertext

⇒ only allow the unavoidable attack.

Definition (Quantum non-malleability (qNM))

A scheme Π = (Enck, Deck) is non-malleable, if for all states ρABR and all attacks ΛCB→C ˜

B,

I(AR : ˜ B)σ ≤ I(AR : B)ρ + h(p=(Λ, ρ)), with σA ˜

BR = ˜

ΛAB→A ˜

B(ρABR).

p=(Λ, ρ) =F(tr ˜

B ΛCB→C ˜ B (|φ+φ+|CC′ ⊗ ρB ),

|φ+φ+|CC′ )2

slide-48
SLIDE 48

Alternative characterization

◮ qNM can be characterized in the simulation picture!

slide-49
SLIDE 49

Alternative characterization

◮ qNM can be characterized in the simulation picture!

Theorem (Alagic, CM)

Let Π = (Enck, Deck) be a quantum encryption scheme. Π is qNM if and only if , where Λ′ and Λ′′ are explicitly given in terms of Λ.

slide-50
SLIDE 50

Earlier definition

Setup: Alagic, CM Ambainis, Bouda and Winter ’09

slide-51
SLIDE 51

Earlier definition

Setup: Alagic, CM Ambainis, Bouda and Winter ’09 Simulator: Alagic, CM Ambainis, Bouda and Winter ’09

slide-52
SLIDE 52

Earlier definition

Setup: Alagic, CM Ambainis, Bouda and Winter ’09 Simulator: Alagic, CM Ambainis, Bouda and Winter ’09 Separating scheme: ABW-NM allows ”plaintext injection” attack, qNM prevents it

slide-53
SLIDE 53

More Properties

! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design

slide-54
SLIDE 54

More Properties

! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)

slide-55
SLIDE 55

More Properties

! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)

◮ non-unitary schemes are interesting, e.g. for authentication.

slide-56
SLIDE 56

More Properties

! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)

◮ non-unitary schemes are interesting, e.g. for authentication.

! qNM ⇒ information theoretic IND

slide-57
SLIDE 57

More Properties

! Unitary encryption maps: qNM⇔ {Enck}k is unitary 2-design(⇔ ABW-NM, Ambainis et al.)

◮ non-unitary schemes are interesting, e.g. for authentication.

! qNM ⇒ information theoretic IND

◮ qNM serves as primitive for quantum authentication schemes

⇒ last part of the talk

slide-58
SLIDE 58

Summary non-malleability

ABW-NM qNM assumes secrecy implies secrecy secure against plaintext injection primitive for authentication

slide-59
SLIDE 59

Authentication

slide-60
SLIDE 60

Authentication

I want a new notebook!

Transfer 1000$ to <notebook store>

encrypt decrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E

slide-61
SLIDE 61

Quantum authentication

◮ First studied by Barnum et al. ’02

slide-62
SLIDE 62

Quantum authentication

◮ First studied by Barnum et al. ’02 ◮ Most used definition by Dupuis, Nielsen and Salvail ’10

slide-63
SLIDE 63

Quantum authentication

◮ First studied by Barnum et al. ’02 ◮ Most used definition by Dupuis, Nielsen and Salvail ’10 ◮ New definition by Garg, Yuen and Zhandry ’16 (next talk):

slide-64
SLIDE 64

Quantum authentication

◮ First studied by Barnum et al. ’02 ◮ Most used definition by Dupuis, Nielsen and Salvail ’10 ◮ New definition by Garg, Yuen and Zhandry ’16 (next talk):

Definition (GYZ Authentication; Garg, Yuen and Zhandry)

Π = (Enck, Deck) is ε-GYZ-authenticating if, for any attack ΛCB→CB′, there exists Λacc

B→ ˜ B such that for all ρAB

Ek

  • Πacc [Deck ◦ Λ ◦ Enck(ρAB)] Πacc −
  • idA ⊗ Λacc

(ρAB)

  • 1
  • ≤ ε

with Πacc = 1 − ⊥.

slide-65
SLIDE 65

GYZ-authentication with 2-designs

◮ GYZ authenticating scheme from 8-designs (GYZ ’16)

slide-66
SLIDE 66

GYZ-authentication with 2-designs

◮ GYZ authenticating scheme from 8-designs (GYZ ’16) ◮ Using representation-theoretic analysis:

Theorem (Alagic, CM)

Adding a constant tag to a quantum message and applying a random element from a 2-design provides GYZ authentication.

slide-67
SLIDE 67

GYZ-authentication with 2-designs

◮ GYZ authenticating scheme from 8-designs (GYZ ’16) ◮ Using representation-theoretic analysis:

Theorem (Alagic, CM)

Adding a constant tag to a quantum message and applying a random element from a 2-design provides GYZ authentication.

◮ Independently proven by Portmann ’16

slide-68
SLIDE 68

GYZ-authentication with 2-designs

◮ GYZ authenticating scheme from 8-designs (GYZ ’16) ◮ Using representation-theoretic analysis:

Theorem (Alagic, CM)

Adding a constant tag to a quantum message and applying a random element from a 2-design provides GYZ authentication.

◮ Independently proven by Portmann ’16 ◮ advantages: shorter keys, nice constructions (Clifford group)

slide-69
SLIDE 69

Proof sketch

consider pure states and attack isometries (Stinespring)

slide-70
SLIDE 70

Proof sketch

consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜

B:

ΓV

B→ ˜ B = trCVCB→C ˜ B

slide-71
SLIDE 71

Proof sketch

consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜

B:

ΓV

B→ ˜ B = trCVCB→C ˜ B

same simulator as used by GYZ, introduced by Broadbent and Wainewright ’16

slide-72
SLIDE 72

Proof sketch

consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜

B:

ΓV

B→ ˜ B = trCVCB→C ˜ B

same simulator as used by GYZ, introduced by Broadbent and Wainewright ’16 want to bound Ek

  • 0|T U†

kVUk (|ψAB ⊗ |0T) − ΓV |ψAB

  • 2

2

slide-73
SLIDE 73

Proof sketch

consider pure states and attack isometries (Stinespring) Simulator for an attack isometry VCB→C ˜

B:

ΓV

B→ ˜ B = trCVCB→C ˜ B

same simulator as used by GYZ, introduced by Broadbent and Wainewright ’16 want to bound Ek

  • 0|T U†

kVUk (|ψAB ⊗ |0T) − ΓV |ψAB

  • 2

2

  • Use ”swap trick” trAXBX = trSXX ′AX ⊗ BX ′ and Schur’s

lemma for U → U ⊗ U

slide-74
SLIDE 74

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store>

slide-75
SLIDE 75

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store> 00000000000000

slide-76
SLIDE 76

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store> 00000000000000

encrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An

slide-77
SLIDE 77

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store> 00000000000000

encrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E

slide-78
SLIDE 78

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store> 00000000000000

encrypt decrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe TO7c2N6qjbBPDLy

slide-79
SLIDE 79

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store> 00000000000000

encrypt decrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe TO7c2N6qjbBPDLy=00000000000000?

slide-80
SLIDE 80

Authentication from NM: Intuition

I want a new notebook!

Transfer 1000$ to <notebook store> 00000000000000

encrypt decrypt

qAe5PSkDo3bFfq9 I5pM2jQgfPUrtdcx 7xF8WS9An zfwgpvkSR39da7U haXBA0ya18weOI0 HGP6uqfo7E ZwOL0XEOuVF74D 8bX0vwDCwGOuSe TO7c2N6qjbBPDLy=00000000000000? No!

slide-81
SLIDE 81

Authentication from qNM

Theorem (Alagic, CM)

Adding a constant tag to a quantum message and encrypting it with an qNM scheme achieves DNS-authentication

slide-82
SLIDE 82

Summary authentication

DNS authentication from qNM schemes via tagging GYZ authentication from 2-designs instead of 8-designs

slide-83
SLIDE 83

Open questions

Current work with Gorjan Alagic and T

  • mmaso Gagliardoni