relativistic effects
play

Relativistic Effects Relativistic Bit . . . Can Keep Data Secret: - PowerPoint PPT Presentation

Computer Security . . . Computer Security . . . Main Idea Newtonian . . . Relativistic Effects Relativistic Bit . . . Can Keep Data Secret: Relativistic Bit . . . Why This Works A Simple Scheme Limitations of This . . . Second Algorithm


  1. Computer Security . . . Computer Security . . . Main Idea Newtonian . . . Relativistic Effects Relativistic Bit . . . Can Keep Data Secret: Relativistic Bit . . . Why This Works A Simple Scheme Limitations of This . . . Second Algorithm Vladik Kreinovich Home Page Title Page Department of Computer Science University of Texas at El Paso ◭◭ ◮◮ El Paso, Texas 79968, USA ◭ ◮ vladik@utep.edu Page 1 of 13 Go Back Full Screen Close Quit

  2. Computer Security . . . Computer Security . . . 1. Computer Security without Physics Main Idea • Most existing computer security schemes rely on the Newtonian . . . computational complexity of certain computing tasks. Relativistic Bit . . . Relativistic Bit . . . • For example, RSA relies on the difficulty of factoring Why This Works large integers. Limitations of This . . . • These schemes use sophisticated algorithms. Second Algorithm Home Page • However, these schemes operate within standard com- putational devices. Title Page • These devices are based on classical – non-quantum, ◭◭ ◮◮ non-relativistic – physics. ◭ ◮ Page 2 of 13 Go Back Full Screen Close Quit

  3. Computer Security . . . Computer Security . . . 2. Computer Security and Physics Main Idea • In the 1990s, it was shown that quantum effects can Newtonian . . . be successfully used for secure communications. Relativistic Bit . . . Relativistic Bit . . . • Quantum communications have indeed been used to Why This Works make communications secure. Limitations of This . . . • E.g., supposedly there is a quantum communication Second Algorithm link between the White House and the Pentagon. Home Page • A 2016 Geneva experiment showed that relativistic ef- Title Page fects can also be used to secure communications. ◭◭ ◮◮ ◭ ◮ Page 3 of 13 Go Back Full Screen Close Quit

  4. Computer Security . . . Computer Security . . . 3. Main Idea Main Idea • The corresponding schemes use the fact that: Newtonian . . . Relativistic Bit . . . – according to relativity theory, Relativistic Bit . . . – all communication speeds are limited by the speed Why This Works of light. Limitations of This . . . • These schemes are related to the problem of bit com- Second Algorithm mitment in situations when: Home Page – the two parties do not trust each other Title Page – and there is no third person whom both parties ◭◭ ◮◮ trust. ◭ ◮ • The simplest scheme involves the situation when two Page 4 of 13 companies bid for the same job. Go Back • The smallest bid wins. Full Screen • So, if one party learns about the bid of a competitor, it can offer a slightly smaller amount and win. Close Quit

  5. Computer Security . . . Computer Security . . . 4. Newtonian vs. Relativistic Bidding Main Idea • Thus, if one party submits a bid earlier, the other party Newtonian . . . may learn this bid and win. Relativistic Bit . . . Relativistic Bit . . . • Even if they submit simultaneously, one may submit Why This Works slightly earlier and the other will learn the bid. Limitations of This . . . • Relativistic effects enable to make bidding safe: Second Algorithm Home Page – if both parties submit their bids at the same time but from the different Earth locations, Title Page – then it takes a few milliseconds for each signal to ◭◭ ◮◮ reach the other party, ◭ ◮ – so no one can cheat. Page 5 of 13 • This idea can be extended to cases when we need to Go Back preserve a secret bid for up to 24 hours. Full Screen Close Quit

  6. Computer Security . . . Computer Security . . . 5. Relativistic Bit Commitment: Setting of the Main Idea First Algorithm Newtonian . . . • Suppose that Alice wants to select a bid B and keep it Relativistic Bit . . . secret for time t . Relativistic Bit . . . Why This Works • In the computer, all information is stored as 0s and 1s. Limitations of This . . . • It is thus sufficient to consider each bit d from the bid. Second Algorithm Home Page • Alice does not want Bob to learn the bit until time t . Title Page • Bob wants to make sure that this bit d stays the same. ◭◭ ◮◮ • Alice and Bob do not trust each other. ◭ ◮ • However, Alice has a trusted friend Amy. Page 6 of 13 • At first, all three on them are at the same location. Go Back Full Screen Close Quit

  7. Computer Security . . . Computer Security . . . 6. Relativistic Bit Commitment: First Algorithm Main Idea • Alice selects (and shares with Amy): Newtonian . . . Relativistic Bit . . . – a bit d and Relativistic Bit . . . – a random integer a from 1 to N . Why This Works • After this, Amy moves to a faraway location, at a dis- Limitations of This . . . tance r > c · t . Second Algorithm • After that, Bob generated a random integer Home Page b ∈ { 1 , . . . , N } , and sends it to Alice. Title Page • Alice replies with r = a + b · d mod N . ◭◭ ◮◮ • So, Bob gets either a or a + b . ◭ ◮ • Then, Amy sends a to Bob. Page 7 of 13 • Once Bob gets a , he compares a with Alice’s answer: Go Back – if r = a , this means that d = 0; Full Screen – if r = a + b , this means that d = 1. Close Quit

  8. Computer Security . . . Computer Security . . . 7. Why This Works Main Idea • Bob cannot find d : Newtonian . . . Relativistic Bit . . . – all he knows is a random number, Relativistic Bit . . . – without knowing a , we cannot tell whether it is a Why This Works or a + b . Limitations of This . . . • Amy cannot cheat: Second Algorithm Home Page – from the moment Alice learns b , Title Page – it takes Alice at least time t to send b to Amy, and at least as long to send the reply to Bob, ◭◭ ◮◮ – so a b -dependent reply cannot get to Bob before ◭ ◮ time t . Page 8 of 13 Go Back Full Screen Close Quit

  9. Computer Security . . . Computer Security . . . 8. Limitations of This Algorithm Main Idea • This algorithm is guaranteed to store a secret bit for Newtonian . . . time t = r/c . Relativistic Bit . . . Relativistic Bit . . . • For Earth locations, this time is limited to milliseconds. Why This Works • To store a secret for a second, Amy needs to move to Limitations of This . . . the Moon. Second Algorithm Home Page • To store a secret for 24 hours, Amy must go beyond Solar systems. Title Page • This is good for the future, but we cannot do it yet. ◭◭ ◮◮ • So, to store a bit for longer than milliseconds, we need ◭ ◮ a different algorithm. Page 9 of 13 Go Back Full Screen Close Quit

  10. Computer Security . . . Computer Security . . . 9. Second Algorithm Main Idea • In the second algorithm, Bob also has a trusted friend Newtonian . . . Brian. Relativistic Bit . . . Relativistic Bit . . . • At first, Alice and Amy select a sequence of random Why This Works numbers a 1 , . . . , a m . Limitations of This . . . • Simultaneously, Bob and Brian select their sequence of Second Algorithm random numbers b 1 , . . . , b m . Home Page • Then, Amy and Brian jointly move away to a distance Title Page r > c · ∆ t . ◭◭ ◮◮ • First, Bob sends b 1 to Alice, she replies with ◭ ◮ r 1 = a 1 + b 1 · d. Page 10 of 13 Go Back • After time ∆ t , Brian sends b 2 to Amy, she replies with Full Screen r 2 = a 2 + b 2 · a 1 . Close Quit

  11. Computer Security . . . Computer Security . . . 10. Second Algorithm (cont-d) Main Idea • Since r > c · ∆ t , neither Amy not Brian have informa- Newtonian . . . tion about the first exchange. Relativistic Bit . . . Relativistic Bit . . . • After time ∆ t , Bob sends b 3 to Alice, she replies with Why This Works r 3 = a 3 + b 3 · a 2 , etc. Limitations of This . . . Second Algorithm • At each cycle m , Bob or Brian send b m , and get Home Page r m = a m + b m · a m − 1 . Title Page ◭◭ ◮◮ • At the end, Amy and/or Alice reveal a m and d . ◭ ◮ • Based on a m and r m = a m + b m · a m − 1 , Bob and Brain can compute b m · a m − 1 . Page 11 of 13 • Since they know b m , they can compute a m − 1 . Go Back • Similarly, from a m − 1 and r m − 1 = a m − 1 + b m − 1 · a m − 2 , Full Screen we can compute b m − 1 · a m − 2 hence a m − 2 , etc. Close Quit

  12. Computer Security . . . Computer Security . . . 11. Second Algorithm: Discussion Main Idea • Eventually, based on r 1 = a 1 + b 1 · d , a 1 , and b 1 , Bob Newtonian . . . and Brian can compute d . Relativistic Bit . . . Relativistic Bit . . . • So, Bob and Brian have: Why This Works – the value d that was officially disclosed by Amy and Limitations of This . . . – the value d that was used originally – that they can Second Algorithm calculate. Home Page • So, Bob and Brian can then check that it is the same Title Page d as before. ◭◭ ◮◮ • If we have m pairs of random numbers, we can keep a ◭ ◮ secret during time m · ∆ t . Page 12 of 13 • The larger m , the longer we can keep a secret. Go Back • In Geneve, Switzerland, the secret was kept for 24 Full Screen hours. Close Quit

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend