Secure bit commitment from relativistic constraints Jed Kaniewski - - PowerPoint PPT Presentation

secure bit commitment from relativistic constraints
SMART_READER_LITE
LIVE PREVIEW

Secure bit commitment from relativistic constraints Jed Kaniewski - - PowerPoint PPT Presentation

Secure bit commitment from relativistic constraints Jed Kaniewski Centre for Quantum Technologies National University of Singapore joint work with Marco Tomamichel, Esther H anggi and Stephanie Wehner [ arXiv: 1206.1740 ] QCrypt 2012,


slide-1
SLIDE 1

Secure bit commitment from relativistic constraints

Jed Kaniewski

Centre for Quantum Technologies National University of Singapore joint work with Marco Tomamichel, Esther H¨ anggi and Stephanie Wehner

[arXiv: 1206.1740] QCrypt 2012, Singapore

Jed Kaniewski Secure relativistic bit commitment

slide-2
SLIDE 2

Outline

Two-party cryptographic primitives Classical and quantum bit commitment Relativistic setting Relativistic bit commitment protocol [Kent’11] Security proof Summary and open questions

Jed Kaniewski Secure relativistic bit commitment

slide-3
SLIDE 3

Two-party crypto – concept

both honest = ⇒ protocol goes through and result is as expected ( q (

Jed Kaniewski Secure relativistic bit commitment

slide-4
SLIDE 4

Two-party crypto – concept

Alice is honest = ⇒ she is protected against dishonest Bob (e.g. she catches him cheating, aborts the protocol or he remains ignorant about her input) and vice versa

Jed Kaniewski Secure relativistic bit commitment

slide-5
SLIDE 5

Two-party crypto – examples

secure function evaluation

  • blivious transfer

coin flip (trusted, unbiased randomness) commitment schemes

Jed Kaniewski Secure relativistic bit commitment

slide-6
SLIDE 6

Auction – motivation for commitment schemes

Auctioning is easy if a trusted third-party is available.(

Jed Kaniewski Secure relativistic bit commitment

slide-7
SLIDE 7

Auction – motivation for commitment schemes

???

What if there is no trusted third-party? Be paranoid, trust nobody!

Jed Kaniewski Secure relativistic bit commitment

slide-8
SLIDE 8

Auction – motivation for commitment schemes

???

We could do it if we had a perfect [information-theoretic] safe.

Jed Kaniewski Secure relativistic bit commitment

slide-9
SLIDE 9

Auction – motivation for commitment schemes

???

[MLC'97]

Is this it? (

Jed Kaniewski Secure relativistic bit commitment

slide-10
SLIDE 10

Outline

Two-party cryptographic primitives Classical and quantum bit commitment Relativistic setting Relativistic bit commitment protocol [Kent’11] Security proof Summary and open questions

Jed Kaniewski Secure relativistic bit commitment

slide-11
SLIDE 11

Bit commitment – ideal functionality

Commit phase

Jed Kaniewski Secure relativistic bit commitment

slide-12
SLIDE 12

Bit commitment – ideal functionality

Commit phase

Jed Kaniewski Secure relativistic bit commitment

slide-13
SLIDE 13

Bit commitment – ideal functionality

Commit phase

Jed Kaniewski Secure relativistic bit commitment

slide-14
SLIDE 14

Bit commitment – ideal functionality

Commit phase

Jed Kaniewski Secure relativistic bit commitment

slide-15
SLIDE 15

Bit commitment – ideal functionality

Commit phase

Jed Kaniewski Secure relativistic bit commitment

slide-16
SLIDE 16

Bit commitment – ideal functionality

Commit phase Open phase

Jed Kaniewski Secure relativistic bit commitment

slide-17
SLIDE 17

Bit commitment – ideal functionality

Commit phase Open phase

Jed Kaniewski Secure relativistic bit commitment

slide-18
SLIDE 18

Bit commitment – ideal functionality

Commit phase Open phase

Jed Kaniewski Secure relativistic bit commitment

slide-19
SLIDE 19

Bit commitment – ideal functionality

Commit phase Open phase

Jed Kaniewski Secure relativistic bit commitment

slide-20
SLIDE 20

Cheating objectives

The commit phase is over...

Jed Kaniewski Secure relativistic bit commitment

slide-21
SLIDE 21

Cheating objectives

Alice goes mad!

Jed Kaniewski Secure relativistic bit commitment

slide-22
SLIDE 22

Cheating objectives

She wants to break the safe and read the message!

Jed Kaniewski Secure relativistic bit commitment

slide-23
SLIDE 23

Cheating objectives

Bob goes mad!

Jed Kaniewski Secure relativistic bit commitment

slide-24
SLIDE 24

Cheating objectives

He wants to influence the message, he wants to be uncommitted!

Jed Kaniewski Secure relativistic bit commitment

slide-25
SLIDE 25

Security criteria

The scheme should be hiding. pguess – probability that Alice guesses the commited bit correctly after the commit phase is over Definition A bit commitment protocol is δ-hiding if the fact that Bob is honest implies pguess ≤ 1 2 + δ.

Jed Kaniewski Secure relativistic bit commitment

slide-26
SLIDE 26

Security criteria

The scheme should be binding. Bob should not be able to change his mind after the commit phase is over.

Jed Kaniewski Secure relativistic bit commitment

slide-27
SLIDE 27

Security criteria

1

Dishonest Bob will have two different keys...

Jed Kaniewski Secure relativistic bit commitment

slide-28
SLIDE 28

Security criteria

1

no problemo man! unveil 1 please…

External verifier Victor asks him to unveil 1.q

Jed Kaniewski Secure relativistic bit commitment

slide-29
SLIDE 29

Security criteria

1

no problemo man! unveil 1 please…

Bob attempts to unveil 1.

Jed Kaniewski Secure relativistic bit commitment

slide-30
SLIDE 30

Security criteria

no problemo man! unveil 1 please…

1

p1 is the probability that Alice accepts the unveiling.

Jed Kaniewski Secure relativistic bit commitment

slide-31
SLIDE 31

Security criteria

Definition A bit commitment protocol is ǫ-binding if the fact that Alice is honest implies that there exists a bit c ∈ {0, 1} such that pc ≤ ǫ. What about superposition commitment? For any protocol Bob can commit to an honest superposition and achieve p0 = p1 = 1

2.

Not satisfiable in the quantum world...

Jed Kaniewski Secure relativistic bit commitment

slide-32
SLIDE 32

Security criteria

Definition A bit commitment protocol is ǫ-binding if the fact that Alice is honest implies that there exists a bit c ∈ {0, 1} such that pc ≤ ǫ. What about superposition commitment? For any protocol Bob can commit to an honest superposition and achieve p0 = p1 = 1

2.

Not satisfiable in the quantum world...

Jed Kaniewski Secure relativistic bit commitment

slide-33
SLIDE 33

Security criteria

Definition A bit commitment protocol is ǫ-binding if the fact that Alice is honest implies that there exists a bit c ∈ {0, 1} such that pc ≤ ǫ. What about superposition commitment? For any protocol Bob can commit to an honest superposition and achieve p0 = p1 = 1

2.

Not satisfiable in the quantum world...

Jed Kaniewski Secure relativistic bit commitment

slide-34
SLIDE 34

Security criteria

Definition A bit commitment protocol is ǫ-binding if the fact that Alice is honest implies that there exists a bit c ∈ {0, 1} such that pc ≤ ǫ. Definition A bit commitment protocol is ǫ-weakly binding if the fact that Alice is honest implies that p0 + p1 ≤ 1 + ǫ. Composability? forget it...

Jed Kaniewski Secure relativistic bit commitment

slide-35
SLIDE 35

Security criteria

Definition A bit commitment protocol is ǫ-binding if the fact that Alice is honest implies that there exists a bit c ∈ {0, 1} such that pc ≤ ǫ. Definition A bit commitment protocol is ǫ-weakly binding if the fact that Alice is honest implies that p0 + p1 ≤ 1 + ǫ. Composability? forget it...

Jed Kaniewski Secure relativistic bit commitment

slide-36
SLIDE 36

Security criteria

Definition A bit commitment protocol is ǫ-binding if the fact that Alice is honest implies that there exists a bit c ∈ {0, 1} such that pc ≤ ǫ. Definition A bit commitment protocol is ǫ-weakly binding if the fact that Alice is honest implies that p0 + p1 ≤ 1 + ǫ. Composability? forget it...

Jed Kaniewski Secure relativistic bit commitment

slide-37
SLIDE 37

Outline

Two-party cryptographic primitives Classical and quantum bit commitment Relativistic setting Relativistic bit commitment protocol [Kent’11] Security proof Summary and open questions

Jed Kaniewski Secure relativistic bit commitment

slide-38
SLIDE 38

Relativistic setting

x t

P

t0

Jed Kaniewski Secure relativistic bit commitment

slide-39
SLIDE 39

Relativistic setting

x t

P

t0

' ' ' ' ' '

R Q

t1

Jed Kaniewski Secure relativistic bit commitment

slide-40
SLIDE 40

Relativistic setting

Phase 1

Jed Kaniewski Secure relativistic bit commitment

slide-41
SLIDE 41

Relativistic setting

Phase 1

'

Phase 2

'

Jed Kaniewski Secure relativistic bit commitment

slide-42
SLIDE 42

Relativistic setting

Phase 1

'

Phase 2

Jed Kaniewski Secure relativistic bit commitment

slide-43
SLIDE 43

Relativistic setting

Phase 1

'

Phase 2

' ,

commit

  • pen

agree on a bit reveal the bit independently (in a consistent way)

Jed Kaniewski Secure relativistic bit commitment

slide-44
SLIDE 44

Relativistic setting

Phase 1

'

Phase 2

' ,

commit

  • pen

agree on a bit reveal the bit independently (in a consistent way)

Jed Kaniewski Secure relativistic bit commitment

slide-45
SLIDE 45

Local vs. global command

unveil 1 lah!

Jed Kaniewski Secure relativistic bit commitment

slide-46
SLIDE 46

Local vs. global command

unveil 1 lah!

'

Jed Kaniewski Secure relativistic bit commitment

slide-47
SLIDE 47

Local vs. global command

unveil 1 lah!

' '

i've got moves like Jagger you've got moves like Jagger i've got mooooooo…

Jed Kaniewski Secure relativistic bit commitment

slide-48
SLIDE 48

Local vs. global command

unveil 1 lah!

' '

i've got moves like Jagger you've got moves like Jagger i've got mooooooo…

local command global command

Jed Kaniewski Secure relativistic bit commitment

slide-49
SLIDE 49

Local vs. global command

unveil 1 lah!

' '

i've got moves like Jagger you've got moves like Jagger i've got mooooooo…

local command global command

trivial protocol is secure (directly from no-signalling) no classical protocol can be secure

Jed Kaniewski Secure relativistic bit commitment

slide-50
SLIDE 50

Local vs. global command

unveil 1 lah!

' '

i've got moves like Jagger you've got moves like Jagger i've got mooooooo…

local command global command

trivial protocol is secure (directly from no-signalling) no classical protocol can be secure

w h a t a b

  • u

t q u a n t u m ? ? ?

Jed Kaniewski Secure relativistic bit commitment

slide-51
SLIDE 51

Outline

Two-party cryptographic primitives Classical and quantum bit commitment Relativistic setting Relativistic bit commitment protocol [Kent’11] Security proof Summary and open questions

Jed Kaniewski Secure relativistic bit commitment

slide-52
SLIDE 52

RBC [Kent’11] – Commit phase

... Alice creates n BB84 states . . . q

Jed Kaniewski Secure relativistic bit commitment

slide-53
SLIDE 53

RBC [Kent’11] – Commit phase

... . . . and sends them to Bob.q

Jed Kaniewski Secure relativistic bit commitment

slide-54
SLIDE 54

RBC [Kent’11] – Commit phase

... Bob receives the qubits . . .

Jed Kaniewski Secure relativistic bit commitment

slide-55
SLIDE 55

RBC [Kent’11] – Commit phase

...

{ } ,

commit to 0 ↓ measure in Z

{ } ,

commit to 1 ↓ measure in X

. . . and measures them in either computational or Hadamard basis.

Jed Kaniewski Secure relativistic bit commitment

slide-56
SLIDE 56

RBC [Kent’11] – Commit phase

00100110011101...

Bob obtains a bit string . . .

Jed Kaniewski Secure relativistic bit commitment

slide-57
SLIDE 57

RBC [Kent’11] – Commit phase

00100110011101...

. . . and sends it to his agents.

Jed Kaniewski Secure relativistic bit commitment

slide-58
SLIDE 58

RBC [Kent’11] – Open phase

Jed Kaniewski Secure relativistic bit commitment

slide-59
SLIDE 59

RBC [Kent’11] – Open phase

c

B

, x

B

cC,xC Alice checks if cB

?

= cC, xB is consistent with the BB84 states, xC is consistent with the BB84 states.

Jed Kaniewski Secure relativistic bit commitment

slide-60
SLIDE 60

RBC [Kent’11] – Open phase

c

B

, x

B

cC,xC Alice checks if cB

?

= cC, xB is consistent with the BB84 states, xC is consistent with the BB84 states.

Jed Kaniewski Secure relativistic bit commitment

slide-61
SLIDE 61

RBC [Kent’11] – Open phase

c

B

, x

B

cC,xC Alice checks if cB

?

= cC, xB is consistent with the BB84 states, xC is consistent with the BB84 states.

Jed Kaniewski Secure relativistic bit commitment

slide-62
SLIDE 62

RBC [Kent’11] – Open phase

c

B

, x

B

cC,xC Alice checks if cB

?

= cC, xB is consistent with the BB84 states, xC is consistent with the BB84 states.

Jed Kaniewski Secure relativistic bit commitment

slide-63
SLIDE 63

RBC [Kent’11] – Open phase

c

B

, x

B

cC,xC Alice checks if cB

?

= cC, xB is consistent with the BB84 states, xC is consistent with the BB84 states.

3*

Jed Kaniewski Secure relativistic bit commitment

slide-64
SLIDE 64

Purified RBC [Kent’11]

... ...

Alice creates n EPR pairs . . . q

Jed Kaniewski Secure relativistic bit commitment

slide-65
SLIDE 65

Purified RBC [Kent’11]

... ...

. . . and sends half of each to Bob.q q

Jed Kaniewski Secure relativistic bit commitment

slide-66
SLIDE 66

Purified RBC [Kent’11]

... ... isometry

Bob applies an arbitrary isometry which splits the system into two

  • parts. Each agent receives one of them.

Jed Kaniewski Secure relativistic bit commitment

slide-67
SLIDE 67

RBC [Kent’11] – intuition why it is secure

ability to cheat ability to predict

  • utcomes of two

complementary measurements must preserve entanglement with Alice both agents cannot be entangled with Alice

Jed Kaniewski Secure relativistic bit commitment

slide-68
SLIDE 68

RBC [Kent’11] – intuition why it is secure

ability to cheat ability to predict

  • utcomes of two

complementary measurements must preserve entanglement with Alice both agents cannot be entangled with Alice

Jed Kaniewski Secure relativistic bit commitment

slide-69
SLIDE 69

Outline

Two-party cryptographic primitives Classical and quantum bit commitment Relativistic setting Relativistic bit commitment protocol [Kent’11] Security proof Summary and open questions

Jed Kaniewski Secure relativistic bit commitment

slide-70
SLIDE 70

Security proof – no-signalling

Charlie c = 0 c = 1 accept reject reject accept Bob b = 0 accept p0 a12 · α reject a21 a22 a23 a24 b = 1 reject · · · a34 accept · · · p1

Jed Kaniewski Secure relativistic bit commitment

slide-71
SLIDE 71

Security proof – no-signalling

Charlie c = 0 c = 1 accept reject reject accept Bob b = 0 accept p0 a12 · α reject a21 a22 a23 a24 b = 1 reject · · · a34 accept · · · p1

p0 + p1 ≤ 1 + α

Jed Kaniewski Secure relativistic bit commitment

slide-72
SLIDE 72

Security proof – no-signalling

Charlie c = 0 c = 1 accept reject reject accept Bob b = 0 accept p0 a12 · α reject a21 a22 a23 a24 b = 1 reject · · · a34 accept · · · p1

p0 + p1 ≤ 1 + α GOAL : get a bound on α

Jed Kaniewski Secure relativistic bit commitment

slide-73
SLIDE 73

Security proof – uncertainty relation [TR’11]

A B C

Jed Kaniewski Secure relativistic bit commitment

slide-74
SLIDE 74

Security proof – uncertainty relation [TR’11]

A B C

Z X

{Nx} {Mz}

Jed Kaniewski Secure relativistic bit commitment

slide-75
SLIDE 75

Security proof – uncertainty relation [TR’11]

A B C

Z X

{Nx} {Mz}

Hmax(Z|B) + Hmin(X|C) ≥ log 1 c , where c := maxz,x | |√Mz √Nx| |2

∞.

Jed Kaniewski Secure relativistic bit commitment

slide-76
SLIDE 76

Security proof – sketchy sketch

. . . red qubits - measure in Z to get Zr green qubits - measured in X to get Xg

Jed Kaniewski Secure relativistic bit commitment

slide-77
SLIDE 77

Security proof – sketchy sketch

. . . red qubits - measure in Z to get Zr green qubits - measured in X to get Xg α = Prob[Bob guesses Zr AND Charlie guesses Xg]= Prob[Bob guesses Zr]*Prob[Charlie guesses Xg | Bob guesses Zr]

Jed Kaniewski Secure relativistic bit commitment

slide-78
SLIDE 78

Security proof – sketchy sketch

. . . red qubits - measure in Z to get Zr green qubits - measured in X to get Xg α = Prob[Bob guesses Zr AND Charlie guesses Xg]= Prob[Bob guesses Zr]*Prob[Charlie guesses Xg | Bob guesses Zr] Bob is able to guess Zr with high probability his knowledge about Zg must also be significant Hmax(Zg|B) must be low Hmin(Xg|C) must be high Charlie cannot guess Xg his knowledge about Zr must be significant (the sampling is random) (uncertainty relation)

Jed Kaniewski Secure relativistic bit commitment

slide-79
SLIDE 79

Security proof – main result

Doing the maths properly gives α ≤ 21−n(1−h(δ)) + 2 exp

  • −1

2nδ2

  • ,

for any 0 < δ < 1

2 =

⇒ exponential decay. The fastest decay rate is achieved for δ ≈ 0.33, α ∼ 2−0.08n α ≈ 2−10 ⇐ ⇒ n ≈ 125.

Jed Kaniewski Secure relativistic bit commitment

slide-80
SLIDE 80

Security proof – main result

Doing the maths properly gives α ≤ 21−n(1−h(δ)) + 2 exp

  • −1

2nδ2

  • ,

for any 0 < δ < 1

2 =

⇒ exponential decay. The fastest decay rate is achieved for δ ≈ 0.33, α ∼ 2−0.08n α ≈ 2−10 ⇐ ⇒ n ≈ 125.

Jed Kaniewski Secure relativistic bit commitment

slide-81
SLIDE 81

Outline

Two-party cryptographic primitives Classical and quantum bit commitment Relativistic setting Relativistic bit commitment protocol [Kent’11] Security proof Summary and open questions

Jed Kaniewski Secure relativistic bit commitment

slide-82
SLIDE 82

Summary

in the split model with two Bobs in the open phase a new issue

  • f extreme importance arises – global vs. local command,

in the local command a classical, trivial protocol gives unconditional security, in the global command no classical protocol can be secure, RBC [Kent’11] can be proven secure in the global command and we provide explicit security bounds.

Jed Kaniewski Secure relativistic bit commitment

slide-83
SLIDE 83

Summary

in the split model with two Bobs in the open phase a new issue

  • f extreme importance arises – global vs. local command,

in the local command a classical, trivial protocol gives unconditional security, in the global command no classical protocol can be secure, RBC [Kent’11] can be proven secure in the global command and we provide explicit security bounds.

Jed Kaniewski Secure relativistic bit commitment

slide-84
SLIDE 84

Summary

in the split model with two Bobs in the open phase a new issue

  • f extreme importance arises – global vs. local command,

in the local command a classical, trivial protocol gives unconditional security, in the global command no classical protocol can be secure, RBC [Kent’11] can be proven secure in the global command and we provide explicit security bounds.

Jed Kaniewski Secure relativistic bit commitment

slide-85
SLIDE 85

Summary

in the split model with two Bobs in the open phase a new issue

  • f extreme importance arises – global vs. local command,

in the local command a classical, trivial protocol gives unconditional security, in the global command no classical protocol can be secure, RBC [Kent’11] can be proven secure in the global command and we provide explicit security bounds.

Jed Kaniewski Secure relativistic bit commitment

slide-86
SLIDE 86

Open questions

the current security bounds are very far from the best attack we can think of... maybe someone could try to close the gap? what about introducing some noise tolerance? (crucial if we think about doing an experiment) we know that RBC cannot be universally composable but maybe some weaker notion of composability holds. can we get string commitment by executing it multiple times (sequentially or in parallel)?

Jed Kaniewski Secure relativistic bit commitment

slide-87
SLIDE 87

Open questions

the current security bounds are very far from the best attack we can think of... maybe someone could try to close the gap? what about introducing some noise tolerance? (crucial if we think about doing an experiment) we know that RBC cannot be universally composable but maybe some weaker notion of composability holds. can we get string commitment by executing it multiple times (sequentially or in parallel)?

Jed Kaniewski Secure relativistic bit commitment

slide-88
SLIDE 88

Open questions

the current security bounds are very far from the best attack we can think of... maybe someone could try to close the gap? what about introducing some noise tolerance? (crucial if we think about doing an experiment) we know that RBC cannot be universally composable but maybe some weaker notion of composability holds. can we get string commitment by executing it multiple times (sequentially or in parallel)?

Jed Kaniewski Secure relativistic bit commitment