Unforgeable Quantum Encryption Gorjan Alagic 1 Tommaso Gagliardoni 2 - - PowerPoint PPT Presentation

unforgeable quantum encryption
SMART_READER_LITE
LIVE PREVIEW

Unforgeable Quantum Encryption Gorjan Alagic 1 Tommaso Gagliardoni 2 - - PowerPoint PPT Presentation

Unforgeable Quantum Encryption Gorjan Alagic 1 Tommaso Gagliardoni 2 Christian Majenz 3 1 QuICS, University of Maryland, and NIST, USA 2 IBM Research Zurich, Switzerland 3 University of Amsterdam, and QuSoft, CWI, The Netherlands May 3rd, 2018 Tel


slide-1
SLIDE 1

Unforgeable Quantum Encryption

Gorjan Alagic1 Tommaso Gagliardoni2 Christian Majenz3

1 QuICS, University of Maryland, and NIST, USA 2 IBM Research Zurich, Switzerland 3 University of Amsterdam, and QuSoft, CWI, The Netherlands

May 3rd, 2018 Tel Aviv, Israel

1

slide-2
SLIDE 2

It’s 1968...

2

slide-3
SLIDE 3

It’s 1968...

2

slide-4
SLIDE 4

It’s 1968...

IBM System/360 Model 85: up to 4 MiB memory!!!

2

slide-5
SLIDE 5

It’s 1968...

IBM System/360 Model 85: up to 4 MiB memory!!! 50 years change things a lot!!!

2

slide-6
SLIDE 6

Meanwhile, in 2018...

IBM Q: 50 superconducting qubits QC

3

slide-7
SLIDE 7

The Very Likely Future Timeline of QC...

4

slide-8
SLIDE 8

The Very Likely Future Timeline of QC...

4

slide-9
SLIDE 9

The Very Likely Future Timeline of QC...

4

slide-10
SLIDE 10

The Very Likely Future Timeline of QC...

4

slide-11
SLIDE 11

The Very Likely Future Timeline of QC...

4

slide-12
SLIDE 12

The Very Likely Future Timeline of QC...

But remember: 50 years change things a lot!!!

4

slide-13
SLIDE 13

The Very Likely Future Timeline of QC...

But remember: 50 years change things a lot!!! Scenario: honest and malicious parties alike have access to quantum computers and quantum communication networks. Need to exchange and secure data over a ‘quantum Internet’.

4

slide-14
SLIDE 14

Quantum Encryption

Secret-key quantum encryption scheme: plaintext and ciphertext are arbitrary quantum states (but key is still classical)

5

slide-15
SLIDE 15

Quantum Encryption

Secret-key quantum encryption scheme: plaintext and ciphertext are arbitrary quantum states (but key is still classical) Example: Quantum One-Time Pad (QOTP)

5

slide-16
SLIDE 16

Quantum Encryption

Secret-key quantum encryption scheme: plaintext and ciphertext are arbitrary quantum states (but key is still classical) Example: Quantum One-Time Pad (QOTP)

5

slide-17
SLIDE 17

Quantum Encryption

Secret-key quantum encryption scheme: plaintext and ciphertext are arbitrary quantum states (but key is still classical) Example: Quantum One-Time Pad (QOTP)

5

slide-18
SLIDE 18

Quantum Encryption

Secret-key quantum encryption scheme: plaintext and ciphertext are arbitrary quantum states (but key is still classical) Example: Quantum One-Time Pad (QOTP)

5

slide-19
SLIDE 19

Quantum Encryption

Secret-key quantum encryption scheme: plaintext and ciphertext are arbitrary quantum states (but key is still classical) Example: Quantum One-Time Pad (QOTP)

5

slide-20
SLIDE 20

Security for Quantum Encryption

[BJ15] introduce quantum indistinguishability under chosen-plaintext attack (QIND-CPA)

6

slide-21
SLIDE 21

Security for Quantum Encryption

[BJ15] introduce quantum indistinguishability under chosen-plaintext attack (QIND-CPA)

6

slide-22
SLIDE 22

Security for Quantum Encryption

[BJ15] introduce quantum indistinguishability under chosen-plaintext attack (QIND-CPA)

6

slide-23
SLIDE 23

Security for Quantum Encryption

[BJ15] introduce quantum indistinguishability under chosen-plaintext attack (QIND-CPA)

6

slide-24
SLIDE 24

Security for Quantum Encryption

[BJ15] introduce quantum indistinguishability under chosen-plaintext attack (QIND-CPA)

6

slide-25
SLIDE 25

Security for Quantum Encryption

[BJ15] introduce quantum indistinguishability under chosen-plaintext attack (QIND-CPA)

6

slide-26
SLIDE 26

Security for Quantum Encryption

[ABF+16] introduce quantum indistinguishability under non-adaptive chosen-ciphertext attack (QIND-CCA1)

7

slide-27
SLIDE 27

Security for Quantum Encryption

[ABF+16] introduce quantum indistinguishability under non-adaptive chosen-ciphertext attack (QIND-CCA1)

7

slide-28
SLIDE 28

Security for Quantum Encryption

[ABF+16] introduce quantum indistinguishability under non-adaptive chosen-ciphertext attack (QIND-CCA1) Theorem [ABF+16] QIND-CCA1 schemes from quantum-resistant OWFs.

7

slide-29
SLIDE 29

Security for Quantum Encryption

[ABF+16] introduce quantum indistinguishability under non-adaptive chosen-ciphertext attack (QIND-CCA1) Theorem [ABF+16] QIND-CCA1 schemes from quantum-resistant OWFs.

7

slide-30
SLIDE 30

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky!

8

slide-31
SLIDE 31

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥)

8

slide-32
SLIDE 32

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

8

slide-33
SLIDE 33

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

  • what does it mean that two states are “equal”?

8

slide-34
SLIDE 34

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

  • what does it mean that two states are “equal”?
  • how to check that without destroying the states?

8

slide-35
SLIDE 35

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

  • what does it mean that two states are “equal”?
  • how to check that without destroying the states?

Defining QIND-CCA2 open problem for a while [BZ12, BJ15, GHS16]

8

slide-36
SLIDE 36

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

  • what does it mean that two states are “equal”?
  • how to check that without destroying the states?

Defining QIND-CCA2 open problem for a while [BZ12, BJ15, GHS16] Similar problem for defining INT-CTXT (unforgeability/integrity)

8

slide-37
SLIDE 37

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

  • what does it mean that two states are “equal”?
  • how to check that without destroying the states?

Defining QIND-CCA2 open problem for a while [BZ12, BJ15, GHS16] Similar problem for defining INT-CTXT (unforgeability/integrity) Existing notions of quantum authentication [DNS, GYZ] have limitations

8

slide-38
SLIDE 38

The Problem With Quantum IND-CCA2

Defining quantum IND-CCA2 is tricky! Classically: must impose that no decryption queries are accepted on the challenge ciphertext (decryption oracle replies ⊥) Quantumly: how to enforce that?

  • what does it mean that two states are “equal”?
  • how to check that without destroying the states?

Defining QIND-CCA2 open problem for a while [BZ12, BJ15, GHS16] Similar problem for defining INT-CTXT (unforgeability/integrity) Existing notions of quantum authentication [DNS, GYZ] have limitations What about quantum authenticated encryption?

8

slide-39
SLIDE 39

Overview of Results

In this work:

9

slide-40
SLIDE 40

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

9

slide-41
SLIDE 41

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

9

slide-42
SLIDE 42

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

  • Definition of QIND-CCA2

9

slide-43
SLIDE 43

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

  • Definition of QIND-CCA2
  • Definition of Quantum Authenticated Encryption (QAE)

9

slide-44
SLIDE 44

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

  • Definition of QIND-CCA2
  • Definition of Quantum Authenticated Encryption (QAE)
  • Relationships amongst all these notions and the known ones

9

slide-45
SLIDE 45

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

  • Definition of QIND-CCA2
  • Definition of Quantum Authenticated Encryption (QAE)
  • Relationships amongst all these notions and the known ones
  • Relationships to the classical counterparts when restricted to

classical messages

9

slide-46
SLIDE 46

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

  • Definition of QIND-CCA2
  • Definition of Quantum Authenticated Encryption (QAE)
  • Relationships amongst all these notions and the known ones
  • Relationships to the classical counterparts when restricted to

classical messages

  • Separations

9

slide-47
SLIDE 47

Overview of Results

In this work:

  • First definition of information-theoretical one-time quantum

ciphertext authentication (QCA)

  • Definition of Quantum Ciphertext Unforgeability (generalizes

INT-CTXT to the quantum setting)

  • Definition of QIND-CCA2
  • Definition of Quantum Authenticated Encryption (QAE)
  • Relationships amongst all these notions and the known ones
  • Relationships to the classical counterparts when restricted to

classical messages

  • Separations
  • Constructions

9

slide-48
SLIDE 48

Integrity of Ciphertexts (INT-CTXT)

10

slide-49
SLIDE 49

Integrity of Ciphertexts (INT-CTXT)

10

slide-50
SLIDE 50

Integrity of Ciphertexts (INT-CTXT)

10

slide-51
SLIDE 51

Integrity of Ciphertexts (INT-CTXT)

10

slide-52
SLIDE 52

Integrity of Ciphertexts (INT-CTXT)

10

slide-53
SLIDE 53

Integrity of Ciphertexts (INT-CTXT)

10

slide-54
SLIDE 54

Integrity of Ciphertexts (INT-CTXT)

10

slide-55
SLIDE 55

Integrity of Ciphertexts (INT-CTXT)

10

slide-56
SLIDE 56

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat]

11

slide-57
SLIDE 57

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat] Defining the quantum analogue of UF-Forge and UF-Cheat:

11

slide-58
SLIDE 58

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat] Defining the quantum analogue of UF-Forge and UF-Cheat:

  • defining QUF-Forge easy (just define |⊥)

11

slide-59
SLIDE 59

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat] Defining the quantum analogue of UF-Forge and UF-Cheat:

  • defining QUF-Forge easy (just define |⊥)
  • to define QUF-Cheat we need to detect ciphertext replays; this is

potentially easier than testing equality!

11

slide-60
SLIDE 60

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat] Defining the quantum analogue of UF-Forge and UF-Cheat:

  • defining QUF-Forge easy (just define |⊥)
  • to define QUF-Cheat we need to detect ciphertext replays; this is

potentially easier than testing equality! Theorem [AM17] (informal) For any symmetric-key quantum encryption scheme:

11

slide-61
SLIDE 61

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat] Defining the quantum analogue of UF-Forge and UF-Cheat:

  • defining QUF-Forge easy (just define |⊥)
  • to define QUF-Cheat we need to detect ciphertext replays; this is

potentially easier than testing equality! Theorem [AM17] (informal) For any symmetric-key quantum encryption scheme:

  • the encryption can be decomposed as: pad-then-transform

11

slide-62
SLIDE 62

Quantum Unforgeability (QUF)

Proposition A (classical) scheme is INT-CTXT iff ∀ A = ⇒ Pr[A wins UF-Forge] ≈ Pr[A wins UF-Cheat] Defining the quantum analogue of UF-Forge and UF-Cheat:

  • defining QUF-Forge easy (just define |⊥)
  • to define QUF-Cheat we need to detect ciphertext replays; this is

potentially easier than testing equality! Theorem [AM17] (informal) For any symmetric-key quantum encryption scheme:

  • the encryption can be decomposed as: pad-then-transform
  • the “pad” is a classical tag, and is recovered during decryption

11

slide-63
SLIDE 63

Detecting Ciphertext Replays

Idea:

12

slide-64
SLIDE 64

Detecting Ciphertext Replays

Idea:

1 when A asks an encryption query, do not reply with the

correct ciphertext!

12

slide-65
SLIDE 65

Detecting Ciphertext Replays

Idea:

1 when A asks an encryption query, do not reply with the

correct ciphertext!

2 instead, generate an element of a random basis, encrypt it

using classical tag t and reply with such encryption; store t and classical representation of the element

12

slide-66
SLIDE 66

Detecting Ciphertext Replays

Idea:

1 when A asks an encryption query, do not reply with the

correct ciphertext!

2 instead, generate an element of a random basis, encrypt it

using classical tag t and reply with such encryption; store t and classical representation of the element

3 quantumly, authentication implies encryption: therefore, if a

scheme is unforgeable, A cannot detect this replacement

12

slide-67
SLIDE 67

Detecting Ciphertext Replays

Idea:

1 when A asks an encryption query, do not reply with the

correct ciphertext!

2 instead, generate an element of a random basis, encrypt it

using classical tag t and reply with such encryption; store t and classical representation of the element

3 quantumly, authentication implies encryption: therefore, if a

scheme is unforgeable, A cannot detect this replacement

4 when decrypting, first check whether the recovered tag

matches the t recorded

12

slide-68
SLIDE 68

Detecting Ciphertext Replays

Idea:

1 when A asks an encryption query, do not reply with the

correct ciphertext!

2 instead, generate an element of a random basis, encrypt it

using classical tag t and reply with such encryption; store t and classical representation of the element

3 quantumly, authentication implies encryption: therefore, if a

scheme is unforgeable, A cannot detect this replacement

4 when decrypting, first check whether the recovered tag

matches the t recorded

5 if so, measure the recovered plaintext in the recorded base and

check whether this is the previously generated element

12

slide-69
SLIDE 69

Detecting Ciphertext Replays

Idea:

1 when A asks an encryption query, do not reply with the

correct ciphertext!

2 instead, generate an element of a random basis, encrypt it

using classical tag t and reply with such encryption; store t and classical representation of the element

3 quantumly, authentication implies encryption: therefore, if a

scheme is unforgeable, A cannot detect this replacement

4 when decrypting, first check whether the recovered tag

matches the t recorded

5 if so, measure the recovered plaintext in the recorded base and

check whether this is the previously generated element

6 if so, congratulations: you have just detected a ciphertext

replay!

12

slide-70
SLIDE 70

Properties of QUF

Quantum Unforgeability of Ciphertexts

A scheme is QUF iff ∀ QPT adversary A = ⇒ Pr[A wins QUF-Forge] ≈ Pr[A wins QUF-Cheat]

13

slide-71
SLIDE 71

Properties of QUF

Quantum Unforgeability of Ciphertexts

A scheme is QUF iff ∀ QPT adversary A = ⇒ Pr[A wins QUF-Forge] ≈ Pr[A wins QUF-Cheat]

Theorem

QUF = ⇒ QIND-CPA

13

slide-72
SLIDE 72

Properties of QUF

Quantum Unforgeability of Ciphertexts

A scheme is QUF iff ∀ QPT adversary A = ⇒ Pr[A wins QUF-Forge] ≈ Pr[A wins QUF-Cheat]

Theorem

QUF = ⇒ QIND-CPA

  • therefore QUF is not the “quantum analogue” of INT-CTXT

13

slide-73
SLIDE 73

Properties of QUF

Quantum Unforgeability of Ciphertexts

A scheme is QUF iff ∀ QPT adversary A = ⇒ Pr[A wins QUF-Forge] ≈ Pr[A wins QUF-Cheat]

Theorem

QUF = ⇒ QIND-CPA

  • therefore QUF is not the “quantum analogue” of INT-CTXT
  • this is a typically quantum property: in the quantum world

authentication implies encryption

13

slide-74
SLIDE 74

Properties of QUF

Quantum Unforgeability of Ciphertexts

A scheme is QUF iff ∀ QPT adversary A = ⇒ Pr[A wins QUF-Forge] ≈ Pr[A wins QUF-Cheat]

Theorem

QUF = ⇒ QIND-CPA

  • therefore QUF is not the “quantum analogue” of INT-CTXT
  • this is a typically quantum property: in the quantum world

authentication implies encryption Theorem

The classical restriction of QUF is equivalent to AE

13

slide-75
SLIDE 75

Properties of QUF

Quantum Unforgeability of Ciphertexts

A scheme is QUF iff ∀ QPT adversary A = ⇒ Pr[A wins QUF-Forge] ≈ Pr[A wins QUF-Cheat]

Theorem

QUF = ⇒ QIND-CPA

  • therefore QUF is not the “quantum analogue” of INT-CTXT
  • this is a typically quantum property: in the quantum world

authentication implies encryption Theorem

The classical restriction of QUF is equivalent to AE

  • however, we show that QUF is not the “right” quantum

analogue of AE either (spoiler: it does not imply QIND-CCA2)

13

slide-76
SLIDE 76

Quantum IND-CCA2

For defining QIND-CCA2: similar idea

14

slide-77
SLIDE 77

Quantum IND-CCA2

For defining QIND-CCA2: similar idea

  • Define an unrestricted QCCA2-Test game, where no restrictions are

imposed on the decryption oracle

14

slide-78
SLIDE 78

Quantum IND-CCA2

For defining QIND-CCA2: similar idea

  • Define an unrestricted QCCA2-Test game, where no restrictions are

imposed on the decryption oracle

  • Define a QCCA2-Fake game, where the adversary wins iff a

decryption of the challenge ciphertext is detected

14

slide-79
SLIDE 79

Properties of QIND-CCA2

Quantum IND-CCA2

A scheme is QIND-CCA2 iff ∀ QPT adversary A = ⇒ Pr[A wins QCCA2-Test] − Pr[A wins QCCA2-Fake] ≤ negligible

15

slide-80
SLIDE 80

Properties of QIND-CCA2

Quantum IND-CCA2

A scheme is QIND-CCA2 iff ∀ QPT adversary A = ⇒ Pr[A wins QCCA2-Test] − Pr[A wins QCCA2-Fake] ≤ negligible

Theorem

QIND-CCA2 = ⇒ QIND-CCA1

15

slide-81
SLIDE 81

Properties of QIND-CCA2

Quantum IND-CCA2

A scheme is QIND-CCA2 iff ∀ QPT adversary A = ⇒ Pr[A wins QCCA2-Test] − Pr[A wins QCCA2-Fake] ≤ negligible

Theorem

QIND-CCA2 = ⇒ QIND-CCA1

Theorem

The classical restriction of QIND-CCA2 is equivalent to IND-CCA2

15

slide-82
SLIDE 82

Quantum Authenticated Encryption (QAE)

Idea: use replay-detecting on a real-VS-ideal approach. Quantum Authenticated Encryption (QAE) A scheme is QAE iff ∀ A = ⇒ Pr[A distinguishes QAE-Real from QAE-Ideal] is at most negligibly better than guessing.

16

slide-83
SLIDE 83

Quantum Authenticated Encryption (QAE)

Idea: use replay-detecting on a real-VS-ideal approach. Quantum Authenticated Encryption (QAE) A scheme is QAE iff ∀ A = ⇒ Pr[A distinguishes QAE-Real from QAE-Ideal] is at most negligibly better than guessing. QAE has all the nice properties you would expect:

16

slide-84
SLIDE 84

Quantum Authenticated Encryption (QAE)

Idea: use replay-detecting on a real-VS-ideal approach. Quantum Authenticated Encryption (QAE) A scheme is QAE iff ∀ A = ⇒ Pr[A distinguishes QAE-Real from QAE-Ideal] is at most negligibly better than guessing. QAE has all the nice properties you would expect: Theorem QAE = ⇒ QIND-CCA2

16

slide-85
SLIDE 85

Quantum Authenticated Encryption (QAE)

Idea: use replay-detecting on a real-VS-ideal approach. Quantum Authenticated Encryption (QAE) A scheme is QAE iff ∀ A = ⇒ Pr[A distinguishes QAE-Real from QAE-Ideal] is at most negligibly better than guessing. QAE has all the nice properties you would expect: Theorem QAE = ⇒ QIND-CCA2 Theorem QAE = ⇒ QUF

16

slide-86
SLIDE 86

Quantum Authenticated Encryption (QAE)

Idea: use replay-detecting on a real-VS-ideal approach. Quantum Authenticated Encryption (QAE) A scheme is QAE iff ∀ A = ⇒ Pr[A distinguishes QAE-Real from QAE-Ideal] is at most negligibly better than guessing. QAE has all the nice properties you would expect: Theorem QAE = ⇒ QIND-CCA2 Theorem QAE = ⇒ QUF Theorem The classical restriction of QAE is equivalent to AE (but: QAE is equivalent to QUF only on the classical level)

16

slide-87
SLIDE 87

Other Results

  • information-theoretical definition of many-times ciphertext

authentication (QCA)...

17

slide-88
SLIDE 88

Other Results

  • information-theoretical definition of many-times ciphertext

authentication (QCA)...

  • ... and its computational variant cQCA...

17

slide-89
SLIDE 89

Other Results

  • information-theoretical definition of many-times ciphertext

authentication (QCA)...

  • ... and its computational variant cQCA...
  • ... and relations to the other notions

17

slide-90
SLIDE 90

Other Results

  • information-theoretical definition of many-times ciphertext

authentication (QCA)...

  • ... and its computational variant cQCA...
  • ... and relations to the other notions
  • separations between all these notions

17

slide-91
SLIDE 91

Other Results

  • information-theoretical definition of many-times ciphertext

authentication (QCA)...

  • ... and its computational variant cQCA...
  • ... and relations to the other notions
  • separations between all these notions
  • secure constructions (ony assuming quantum-secure OWF!)

17

slide-92
SLIDE 92

Other Results

  • information-theoretical definition of many-times ciphertext

authentication (QCA)...

  • ... and its computational variant cQCA...
  • ... and relations to the other notions
  • separations between all these notions
  • secure constructions (ony assuming quantum-secure OWF!)

17

slide-93
SLIDE 93

Conclusions

Take-home message (TL;DR)

  • complete and coherent hierarchy of security notions for

quantum symmetric-key encryption schemes, including the longstanding quantum IND-CCA2

  • quantum authenticated encryption (QAE) as strongest form of

quantum security

  • constructions achievable with minimal security assumptions

(existence of quantum-resistant OWF)

  • 2q-wise independent functions not necessary

18

slide-94
SLIDE 94

Conclusions

Take-home message (TL;DR)

  • complete and coherent hierarchy of security notions for

quantum symmetric-key encryption schemes, including the longstanding quantum IND-CCA2

  • quantum authenticated encryption (QAE) as strongest form of

quantum security

  • constructions achievable with minimal security assumptions

(existence of quantum-resistant OWF)

  • 2q-wise independent functions not necessary

PRETTY COOL :-)

18

slide-95
SLIDE 95

End Of This Talk

Thanks for your attention! tog@zurich.ibm.com

19