Quantum Cryptography Lecture 28 Quantum Cryptography Quantum - - PowerPoint PPT Presentation

quantum cryptography
SMART_READER_LITE
LIVE PREVIEW

Quantum Cryptography Lecture 28 Quantum Cryptography Quantum - - PowerPoint PPT Presentation

Quantum Cryptography Lecture 28 Quantum Cryptography Quantum Cryptography Quantum information: Using microscopic physical state of quantum systems (spin of atoms/sub-atomic particles, polarization of photons etc.) to encode information


slide-1
SLIDE 1

Quantum Cryptography

Lecture 28

slide-2
SLIDE 2

Quantum Cryptography

slide-3
SLIDE 3

Quantum Cryptography

Quantum information: Using microscopic physical state of “quantum systems” (spin of atoms/sub-atomic particles, polarization of photons etc.) to encode information (and generate randomness)

slide-4
SLIDE 4

Quantum Cryptography

Quantum information: Using microscopic physical state of “quantum systems” (spin of atoms/sub-atomic particles, polarization of photons etc.) to encode information (and generate randomness) Quantum Key-Distribution: Can expand a short (one-time) shared secret key into a long one over public channels, without computational restrictions on the adversary, (with some physical idealization assumptions, and assuming quantum mechanics)

slide-5
SLIDE 5

Quantum Cryptography

Quantum information: Using microscopic physical state of “quantum systems” (spin of atoms/sub-atomic particles, polarization of photons etc.) to encode information (and generate randomness) Quantum Key-Distribution: Can expand a short (one-time) shared secret key into a long one over public channels, without computational restrictions on the adversary, (with some physical idealization assumptions, and assuming quantum mechanics) Need special “quantum channels” (optic fibers, free space...)

slide-6
SLIDE 6

Quantum Cryptography

Quantum information: Using microscopic physical state of “quantum systems” (spin of atoms/sub-atomic particles, polarization of photons etc.) to encode information (and generate randomness) Quantum Key-Distribution: Can expand a short (one-time) shared secret key into a long one over public channels, without computational restrictions on the adversary, (with some physical idealization assumptions, and assuming quantum mechanics) Need special “quantum channels” (optic fibers, free space...) Commercially available today

slide-7
SLIDE 7

Quantum Cryptography

Quantum information: Using microscopic physical state of “quantum systems” (spin of atoms/sub-atomic particles, polarization of photons etc.) to encode information (and generate randomness) Quantum Key-Distribution: Can expand a short (one-time) shared secret key into a long one over public channels, without computational restrictions on the adversary, (with some physical idealization assumptions, and assuming quantum mechanics) Need special “quantum channels” (optic fibers, free space...) Commercially available today Beyond QKD: some (limited) multi-party computation results; also, security for “quantum information”

slide-8
SLIDE 8

Qubits

slide-9
SLIDE 9

Qubits

Qubit refers to a quantum state that allows encoding (and decoding) one bit of information

slide-10
SLIDE 10

Qubits

Qubit refers to a quantum state that allows encoding (and decoding) one bit of information State of a system (or of some aspect of it -- like polarization of a photon) is represented, according to quantum mechanics, by a vector of complex numbers

slide-11
SLIDE 11

Qubits

Qubit refers to a quantum state that allows encoding (and decoding) one bit of information State of a system (or of some aspect of it -- like polarization of a photon) is represented, according to quantum mechanics, by a vector of complex numbers But there are several possible ways to encode/decode the information in a qubit, leading to interesting properties

slide-12
SLIDE 12

Qubits

Qubit refers to a quantum state that allows encoding (and decoding) one bit of information State of a system (or of some aspect of it -- like polarization of a photon) is represented, according to quantum mechanics, by a vector of complex numbers But there are several possible ways to encode/decode the information in a qubit, leading to interesting properties A system of multiple qubits shows even more interesting properties, beyond just holding all the bits of information

slide-13
SLIDE 13

Measuring

slide-14
SLIDE 14

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it)

slide-15
SLIDE 15

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it) Basic principle: measuring alters the system

slide-16
SLIDE 16

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it) Basic principle: measuring alters the system A metaphor: need to read the direction of a virtual needle using a “cross”

slide-17
SLIDE 17

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it) Basic principle: measuring alters the system A metaphor: need to read the direction of a virtual needle using a “cross” If either leg of the cross is aligned with the needle, we just learn its alignment (nothing happens to the needle)

slide-18
SLIDE 18

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it) Basic principle: measuring alters the system A metaphor: need to read the direction of a virtual needle using a “cross” If either leg of the cross is aligned with the needle, we just learn its alignment (nothing happens to the needle) Otherwise the needle will move to one of the legs, and we learn which one (but not whether it moved or not)

slide-19
SLIDE 19

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it) Basic principle: measuring alters the system A metaphor: need to read the direction of a virtual needle using a “cross” If either leg of the cross is aligned with the needle, we just learn its alignment (nothing happens to the needle) Otherwise the needle will move to one of the legs, and we learn which one (but not whether it moved or not) To which leg it moves is probabilistic, depending on its

  • riginal position (which we do not learn)
slide-20
SLIDE 20

Measuring

Measurement: reading the state of a qubit (presumably to decode the information encoded in it) Basic principle: measuring alters the system A metaphor: need to read the direction of a virtual needle using a “cross” If either leg of the cross is aligned with the needle, we just learn its alignment (nothing happens to the needle) Otherwise the needle will move to one of the legs, and we learn which one (but not whether it moved or not) To which leg it moves is probabilistic, depending on its

  • riginal position (which we do not learn)

In either case at the end the needle is aligned along a leg of the cross (as reported by the measurement)

slide-21
SLIDE 21

Measuring: Another metaphor

slide-22
SLIDE 22

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers”

slide-23
SLIDE 23

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers” Cards come in two colors (red and blue), and have a value 0/1 on

  • them. Cannot tell the color or the value of a card w/o “reading” it
slide-24
SLIDE 24

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers” Cards come in two colors (red and blue), and have a value 0/1 on

  • them. Cannot tell the color or the value of a card w/o “reading” it

If a red card is inserted into a red reader, it reports the value

  • n the card correctly
slide-25
SLIDE 25

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers” Cards come in two colors (red and blue), and have a value 0/1 on

  • them. Cannot tell the color or the value of a card w/o “reading” it

If a red card is inserted into a red reader, it reports the value

  • n the card correctly

If a red card is read by a blue reader, then the card gets transformed into a blue card with a random value!

slide-26
SLIDE 26

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers” Cards come in two colors (red and blue), and have a value 0/1 on

  • them. Cannot tell the color or the value of a card w/o “reading” it

If a red card is inserted into a red reader, it reports the value

  • n the card correctly

If a red card is read by a blue reader, then the card gets transformed into a blue card with a random value! And the reader will report that value

slide-27
SLIDE 27

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers” Cards come in two colors (red and blue), and have a value 0/1 on

  • them. Cannot tell the color or the value of a card w/o “reading” it

If a red card is inserted into a red reader, it reports the value

  • n the card correctly

If a red card is read by a blue reader, then the card gets transformed into a blue card with a random value! And the reader will report that value Think of color as “axis-parallel” or “diagonal” needle/cross position

slide-28
SLIDE 28

Measuring: Another metaphor

Qubits as “cards” that can be read using “card readers” Cards come in two colors (red and blue), and have a value 0/1 on

  • them. Cannot tell the color or the value of a card w/o “reading” it

If a red card is inserted into a red reader, it reports the value

  • n the card correctly

If a red card is read by a blue reader, then the card gets transformed into a blue card with a random value! And the reader will report that value Think of color as “axis-parallel” or “diagonal” needle/cross position Note: not exploiting all possibilities, but already useful

slide-29
SLIDE 29

BB84

slide-30
SLIDE 30

BB84

A protocol for “key distribution” by Bennett and Brassard

slide-31
SLIDE 31

BB84

A protocol for “key distribution” by Bennett and Brassard Alice and Bob want to generate a long one time pad (for information theoretically secure encryption)

slide-32
SLIDE 32

BB84

A protocol for “key distribution” by Bennett and Brassard Alice and Bob want to generate a long one time pad (for information theoretically secure encryption) But only public channels to communicate over

slide-33
SLIDE 33

BB84

A protocol for “key distribution” by Bennett and Brassard Alice and Bob want to generate a long one time pad (for information theoretically secure encryption) But only public channels to communicate over Suppose in addition a “quantum channel” (controlled by the adversary) to send qubits

slide-34
SLIDE 34

BB84

A protocol for “key distribution” by Bennett and Brassard Alice and Bob want to generate a long one time pad (for information theoretically secure encryption) But only public channels to communicate over Suppose in addition a “quantum channel” (controlled by the adversary) to send qubits And the public channel is authenticated (for now), so that the adversary cannot inject messages into it

slide-35
SLIDE 35

BB84

A protocol for “key distribution” by Bennett and Brassard Alice and Bob want to generate a long one time pad (for information theoretically secure encryption) But only public channels to communicate over Suppose in addition a “quantum channel” (controlled by the adversary) to send qubits And the public channel is authenticated (for now), so that the adversary cannot inject messages into it BB84 allows them to generate a secret shared keys

slide-36
SLIDE 36

BB84

A protocol for “key distribution” by Bennett and Brassard Alice and Bob want to generate a long one time pad (for information theoretically secure encryption) But only public channels to communicate over Suppose in addition a “quantum channel” (controlled by the adversary) to send qubits And the public channel is authenticated (for now), so that the adversary cannot inject messages into it BB84 allows them to generate a secret shared keys Will describe in terms of red/blue cards and card-readers

slide-37
SLIDE 37

BB84

Alice Bob

slide-38
SLIDE 38

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Alice Bob

slide-39
SLIDE 39

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Alice Bob

slide-40
SLIDE 40

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card

slide-41
SLIDE 41

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card

slide-42
SLIDE 42

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Now tell Bob which color each card originally was Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card

slide-43
SLIDE 43

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Now tell Bob which color each card originally was Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card Discard all cards which were read using the wrong color

slide-44
SLIDE 44

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Now tell Bob which color each card originally was Among the undiscarded cards, Alice and Bob check for consistency: 
 Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card Discard all cards which were read using the wrong color

slide-45
SLIDE 45

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Now tell Bob which color each card originally was Among the undiscarded cards, Alice and Bob check for consistency: 
 Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card Discard all cards which were read using the wrong color Send values obtained for a random subset of the cards

slide-46
SLIDE 46

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Now tell Bob which color each card originally was Among the undiscarded cards, Alice and Bob check for consistency: 
 If any value wrong, abort Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card Discard all cards which were read using the wrong color Send values obtained for a random subset of the cards

slide-47
SLIDE 47

BB84

Prepare several cards, with random colors and values 
 Send the cards to Bob (via Eve) Now tell Bob which color each card originally was Among the undiscarded cards, Alice and Bob check for consistency: 
 If any value wrong, abort Alice Bob Read all cards using red or blue readers randomly. Tell Alice which color reader was used for each card Discard all cards which were read using the wrong color Send values obtained for a random subset of the cards If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-48
SLIDE 48

BB84

If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-49
SLIDE 49

BB84

No-cloning: Eve cannot save copies of the cards If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-50
SLIDE 50

BB84

No-cloning: Eve cannot save copies of the cards And reading a card alters it If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-51
SLIDE 51

BB84

No-cloning: Eve cannot save copies of the cards And reading a card alters it If Eve reads a card (using red or blue reader) she doesn’ t know its original color If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-52
SLIDE 52

BB84

No-cloning: Eve cannot save copies of the cards And reading a card alters it If Eve reads a card (using red or blue reader) she doesn’ t know its original color Suppose she sends it to Bob as a blue card. With prob 1/ 4,

  • riginally the card was red and Bob reads it using red reader

If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-53
SLIDE 53

BB84

No-cloning: Eve cannot save copies of the cards And reading a card alters it If Eve reads a card (using red or blue reader) she doesn’ t know its original color Suppose she sends it to Bob as a blue card. With prob 1/ 4,

  • riginally the card was red and Bob reads it using red reader

If this card is chosen for consistency check, will discover the tampering if the random value obtained by Bob doesn’ t match

  • riginal value on card

If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-54
SLIDE 54

BB84

No-cloning: Eve cannot save copies of the cards And reading a card alters it If Eve reads a card (using red or blue reader) she doesn’ t know its original color Suppose she sends it to Bob as a blue card. With prob 1/ 4,

  • riginally the card was red and Bob reads it using red reader

If this card is chosen for consistency check, will discover the tampering if the random value obtained by Bob doesn’ t match

  • riginal value on card

Eve might get lucky and remain undetected if she alters only a few cards (so Alice and Bob may disagree on those cards) If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-55
SLIDE 55

BB84

No-cloning: Eve cannot save copies of the cards And reading a card alters it If Eve reads a card (using red or blue reader) she doesn’ t know its original color Suppose she sends it to Bob as a blue card. With prob 1/ 4,

  • riginally the card was red and Bob reads it using red reader

If this card is chosen for consistency check, will discover the tampering if the random value obtained by Bob doesn’ t match

  • riginal value on card

Eve might get lucky and remain undetected if she alters only a few cards (so Alice and Bob may disagree on those cards) But then Eve can read only (at most) those cards If consistency check OK, Alice and Bob “almost agree on” the values

  • n the remaining cards and it is “mostly hidden” from Eve: Raw keys
slide-56
SLIDE 56

Raw Keys to Good Keys

slide-57
SLIDE 57

Raw Keys to Good Keys

Raw Keys:

slide-58
SLIDE 58

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ

slide-59
SLIDE 59

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys

slide-60
SLIDE 60

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys Distilling raw keys to good (i.e., almost uniformly random) keys is important in other contexts too

slide-61
SLIDE 61

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys Distilling raw keys to good (i.e., almost uniformly random) keys is important in other contexts too Two step (classical) protocol, over authenticated public channel

slide-62
SLIDE 62

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys Distilling raw keys to good (i.e., almost uniformly random) keys is important in other contexts too Two step (classical) protocol, over authenticated public channel Reconciliation: Alice and Bob calculate and compare several randomized “parity check bits” to isolate and discard errors

slide-63
SLIDE 63

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys Distilling raw keys to good (i.e., almost uniformly random) keys is important in other contexts too Two step (classical) protocol, over authenticated public channel Reconciliation: Alice and Bob calculate and compare several randomized “parity check bits” to isolate and discard errors This gives further information to Eve, but now Alice and Bob agree on the same raw key (with overwhelming probability)

slide-64
SLIDE 64

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys Distilling raw keys to good (i.e., almost uniformly random) keys is important in other contexts too Two step (classical) protocol, over authenticated public channel Reconciliation: Alice and Bob calculate and compare several randomized “parity check bits” to isolate and discard errors This gives further information to Eve, but now Alice and Bob agree on the same raw key (with overwhelming probability) Privacy amplification: Use a randomness extractor to derive a suitably shorter key so that Eve has little information about the new key

slide-65
SLIDE 65

Raw Keys to Good Keys

Raw Keys: A few positions where Alice’ s and Bob’ s keys may differ Eve may have a small amount of information about the keys Distilling raw keys to good (i.e., almost uniformly random) keys is important in other contexts too Two step (classical) protocol, over authenticated public channel Reconciliation: Alice and Bob calculate and compare several randomized “parity check bits” to isolate and discard errors This gives further information to Eve, but now Alice and Bob agree on the same raw key (with overwhelming probability) Privacy amplification: Use a randomness extractor to derive a suitably shorter key so that Eve has little information about the new key Alice picks a seed at random and publicly sends it to Bob; shared key is defined as Extract(RawKey,Seed)

slide-66
SLIDE 66

Using QKD

slide-67
SLIDE 67

Using QKD

Alice and Bob need an authenticated public-channel

slide-68
SLIDE 68

Using QKD

Alice and Bob need an authenticated public-channel Can use one-time MAC with a short key (2-Universal Hash functions work)

slide-69
SLIDE 69

Using QKD

Alice and Bob need an authenticated public-channel Can use one-time MAC with a short key (2-Universal Hash functions work) Originally several idealizations required for security: crucially depends on reliable quantum channels and devices

slide-70
SLIDE 70

Using QKD

Alice and Bob need an authenticated public-channel Can use one-time MAC with a short key (2-Universal Hash functions work) Originally several idealizations required for security: crucially depends on reliable quantum channels and devices Many idealizations can be removed using quantum error- correction, quantum repeaters, self-testing devices

slide-71
SLIDE 71

Using QKD

Alice and Bob need an authenticated public-channel Can use one-time MAC with a short key (2-Universal Hash functions work) Originally several idealizations required for security: crucially depends on reliable quantum channels and devices Many idealizations can be removed using quantum error- correction, quantum repeaters, self-testing devices Commercial products available

slide-72
SLIDE 72

Using QKD

Alice and Bob need an authenticated public-channel Can use one-time MAC with a short key (2-Universal Hash functions work) Originally several idealizations required for security: crucially depends on reliable quantum channels and devices Many idealizations can be removed using quantum error- correction, quantum repeaters, self-testing devices Commercial products available

slide-73
SLIDE 73

Quantum Channel

slide-74
SLIDE 74

Quantum Channel

Transmitting an unknown qubit is delicate (even if uncertainty is a single bit of information): the entire state needs to be sent over a “quantum channel”

slide-75
SLIDE 75

Quantum Channel

Transmitting an unknown qubit is delicate (even if uncertainty is a single bit of information): the entire state needs to be sent over a “quantum channel” e.g.: optic fibers carrying photons

slide-76
SLIDE 76

Quantum Channel

Transmitting an unknown qubit is delicate (even if uncertainty is a single bit of information): the entire state needs to be sent over a “quantum channel” e.g.: optic fibers carrying photons Recall that we can’ t measure the information in an unknown qubit accurately. (Else could have used a classical channel to send that information)

slide-77
SLIDE 77

Quantum Channel

Transmitting an unknown qubit is delicate (even if uncertainty is a single bit of information): the entire state needs to be sent over a “quantum channel” e.g.: optic fibers carrying photons Recall that we can’ t measure the information in an unknown qubit accurately. (Else could have used a classical channel to send that information) Quantum teleportation: Pre-processing quantum communication

slide-78
SLIDE 78

Quantum Channel

Transmitting an unknown qubit is delicate (even if uncertainty is a single bit of information): the entire state needs to be sent over a “quantum channel” e.g.: optic fibers carrying photons Recall that we can’ t measure the information in an unknown qubit accurately. (Else could have used a classical channel to send that information) Quantum teleportation: Pre-processing quantum communication If some “entangled” qubits are shared a priori, then can use a classical channel to “teleport” an unknown qubit (without reading it)

slide-79
SLIDE 79

Entanglements

slide-80
SLIDE 80

Entanglements

A system with multiple qubits exhibits complex behavior

slide-81
SLIDE 81

Entanglements

A system with multiple qubits exhibits complex behavior Two qubits can be correlated in more ways than two classical cards/needles (with probabilistic values) can be

slide-82
SLIDE 82

Entanglements

A system with multiple qubits exhibits complex behavior Two qubits can be correlated in more ways than two classical cards/needles (with probabilistic values) can be More complex correlation than between classical cards, even with hidden state variables (other than color and value)

slide-83
SLIDE 83

Entanglements

A system with multiple qubits exhibits complex behavior Two qubits can be correlated in more ways than two classical cards/needles (with probabilistic values) can be More complex correlation than between classical cards, even with hidden state variables (other than color and value) Called entanglement

slide-84
SLIDE 84

Entanglements

A system with multiple qubits exhibits complex behavior Two qubits can be correlated in more ways than two classical cards/needles (with probabilistic values) can be More complex correlation than between classical cards, even with hidden state variables (other than color and value) Called entanglement “EPR (Einstein-Podolsky-Rosen) paradox”: spooky action at a distance

slide-85
SLIDE 85

Entanglements

A system with multiple qubits exhibits complex behavior Two qubits can be correlated in more ways than two classical cards/needles (with probabilistic values) can be More complex correlation than between classical cards, even with hidden state variables (other than color and value) Called entanglement “EPR (Einstein-Podolsky-Rosen) paradox”: spooky action at a distance Measuring two entangled qubits (cards) appears co-ordinated, as if the two card readers communicate with each other

slide-86
SLIDE 86

Entanglements

A system with multiple qubits exhibits complex behavior Two qubits can be correlated in more ways than two classical cards/needles (with probabilistic values) can be More complex correlation than between classical cards, even with hidden state variables (other than color and value) Called entanglement “EPR (Einstein-Podolsky-Rosen) paradox”: spooky action at a distance Measuring two entangled qubits (cards) appears co-ordinated, as if the two card readers communicate with each other Bell inequality: limit of correlation that is possible classically. Experimentally violated by quantum systems (with caveats)

slide-87
SLIDE 87

QKD History

slide-88
SLIDE 88

QKD History

Bennett and Brassard proposed BB84 in 1984

slide-89
SLIDE 89

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s

slide-90
SLIDE 90

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990

slide-91
SLIDE 91

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990 Several other schemes by now

slide-92
SLIDE 92

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990 Several other schemes by now Original proofs of security considered restricted Eve (e.g., in BB84 Eve measured/transformed each transmitted qubit separately)

slide-93
SLIDE 93

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990 Several other schemes by now Original proofs of security considered restricted Eve (e.g., in BB84 Eve measured/transformed each transmitted qubit separately) Complete proof in 1996, followed by several refined proofs

slide-94
SLIDE 94

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990 Several other schemes by now Original proofs of security considered restricted Eve (e.g., in BB84 Eve measured/transformed each transmitted qubit separately) Complete proof in 1996, followed by several refined proofs Security definitions originally based on information leaked to Eve

slide-95
SLIDE 95

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990 Several other schemes by now Original proofs of security considered restricted Eve (e.g., in BB84 Eve measured/transformed each transmitted qubit separately) Complete proof in 1996, followed by several refined proofs Security definitions originally based on information leaked to Eve But key distribution needs composability (because key will be used for other tasks later, and attack may not be separately on QKD and subsequent use)

slide-96
SLIDE 96

QKD History

Bennett and Brassard proposed BB84 in 1984 Similar ideas by Wiesner in early 1970s QKD scheme based on entanglement by Ekert in 1990 Several other schemes by now Original proofs of security considered restricted Eve (e.g., in BB84 Eve measured/transformed each transmitted qubit separately) Complete proof in 1996, followed by several refined proofs Security definitions originally based on information leaked to Eve But key distribution needs composability (because key will be used for other tasks later, and attack may not be separately on QKD and subsequent use) Universally Composable Security for QKD (2005)

slide-97
SLIDE 97

QKD History

slide-98
SLIDE 98

QKD History

BB84 implemented at IBM Research in 1989: 32cm free air quantum channel

slide-99
SLIDE 99

QKD History

BB84 implemented at IBM Research in 1989: 32cm free air quantum channel Geneva, 2002: 23 km optical fiber cable quantum channel

slide-100
SLIDE 100

QKD History

BB84 implemented at IBM Research in 1989: 32cm free air quantum channel Geneva, 2002: 23 km optical fiber cable quantum channel DARPA network, Boston (since 2003): Between Boston University, Harvard and BBN Technologies

slide-101
SLIDE 101

QKD History

BB84 implemented at IBM Research in 1989: 32cm free air quantum channel Geneva, 2002: 23 km optical fiber cable quantum channel DARPA network, Boston (since 2003): Between Boston University, Harvard and BBN Technologies With wireless links too

slide-102
SLIDE 102

QKD History

BB84 implemented at IBM Research in 1989: 32cm free air quantum channel Geneva, 2002: 23 km optical fiber cable quantum channel DARPA network, Boston (since 2003): Between Boston University, Harvard and BBN Technologies With wireless links too Towards longer links, larger networks

slide-103
SLIDE 103

QKD History

BB84 implemented at IBM Research in 1989: 32cm free air quantum channel Geneva, 2002: 23 km optical fiber cable quantum channel DARPA network, Boston (since 2003): Between Boston University, Harvard and BBN Technologies With wireless links too Towards longer links, larger networks Possibly using “quantum repeaters”

slide-104
SLIDE 104

Beyond QKD

slide-105
SLIDE 105

Beyond QKD

Information-theoretically secure coin-tossing?

slide-106
SLIDE 106

Beyond QKD

Information-theoretically secure coin-tossing? Impossible classically: an adversary can completely bias

slide-107
SLIDE 107

Beyond QKD

Information-theoretically secure coin-tossing? Impossible classically: an adversary can completely bias With quantum channels, known to exist when some 
 limited adversarial bias is allowed

slide-108
SLIDE 108

Beyond QKD

Information-theoretically secure coin-tossing? Impossible classically: an adversary can completely bias With quantum channels, known to exist when some 
 limited adversarial bias is allowed Zero bias coin-tossing is still impossible

slide-109
SLIDE 109

Beyond QKD

Information-theoretically secure coin-tossing? Impossible classically: an adversary can completely bias With quantum channels, known to exist when some 
 limited adversarial bias is allowed Zero bias coin-tossing is still impossible Information-theoretically secure commitment?

slide-110
SLIDE 110

Beyond QKD

Information-theoretically secure coin-tossing? Impossible classically: an adversary can completely bias With quantum channels, known to exist when some 
 limited adversarial bias is allowed Zero bias coin-tossing is still impossible Information-theoretically secure commitment? Impossible even with quantum channels

slide-111
SLIDE 111

Beyond QKD

Information-theoretically secure coin-tossing? Impossible classically: an adversary can completely bias With quantum channels, known to exist when some 
 limited adversarial bias is allowed Zero bias coin-tossing is still impossible Information-theoretically secure commitment? Impossible even with quantum channels Secret-sharing: requiring quantum communication for reconstruction

slide-112
SLIDE 112

Beyond QKD

slide-113
SLIDE 113

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits

slide-114
SLIDE 114

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization

slide-115
SLIDE 115

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits

slide-116
SLIDE 116

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits Authenticating qubits

slide-117
SLIDE 117

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits Authenticating qubits Encrypting qubits

slide-118
SLIDE 118

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits Authenticating qubits Encrypting qubits Multi-party computation when inputs and outputs are qubits

slide-119
SLIDE 119

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits Authenticating qubits Encrypting qubits Multi-party computation when inputs and outputs are qubits Known when 5/ 6th-majority is honest

slide-120
SLIDE 120

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits Authenticating qubits Encrypting qubits Multi-party computation when inputs and outputs are qubits Known when 5/ 6th-majority is honest Post-Quantum Cryptography: Classical/Quantum cryptography secure against computationally bounded quantum adversaries?

slide-121
SLIDE 121

Beyond QKD

Quantum computation: a major field (still not practical), using quantum gates to manipulate qubits “Efficient” algorithm for factorization Cryptography for qubits Authenticating qubits Encrypting qubits Multi-party computation when inputs and outputs are qubits Known when 5/ 6th-majority is honest Post-Quantum Cryptography: Classical/Quantum cryptography secure against computationally bounded quantum adversaries? Several OWF candidates are not quantum-OWF

slide-122
SLIDE 122

Quantum Cryptography

slide-123
SLIDE 123

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary

slide-124
SLIDE 124

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary Quantum Key Distribution: information theoretic security, if reliable quantum channels/devices available

slide-125
SLIDE 125

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary Quantum Key Distribution: information theoretic security, if reliable quantum channels/devices available Still needs a small (one-time) shared key to authenticate the classical channel (MAC)

slide-126
SLIDE 126

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary Quantum Key Distribution: information theoretic security, if reliable quantum channels/devices available Still needs a small (one-time) shared key to authenticate the classical channel (MAC) Needs quantum channels: today limited to short distances

slide-127
SLIDE 127

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary Quantum Key Distribution: information theoretic security, if reliable quantum channels/devices available Still needs a small (one-time) shared key to authenticate the classical channel (MAC) Needs quantum channels: today limited to short distances Also need to counter “quantum hacking”

slide-128
SLIDE 128

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary Quantum Key Distribution: information theoretic security, if reliable quantum channels/devices available Still needs a small (one-time) shared key to authenticate the classical channel (MAC) Needs quantum channels: today limited to short distances Also need to counter “quantum hacking” No magic bullet: QKD doesn’ t have all functionalities of PKE. Other primitives (e.g. commitment) still impossible without computational assumptions.

slide-129
SLIDE 129

Quantum Cryptography

Goal: Don’ t depend on computational restrictions on the adversary Quantum Key Distribution: information theoretic security, if reliable quantum channels/devices available Still needs a small (one-time) shared key to authenticate the classical channel (MAC) Needs quantum channels: today limited to short distances Also need to counter “quantum hacking” No magic bullet: QKD doesn’ t have all functionalities of PKE. Other primitives (e.g. commitment) still impossible without computational assumptions. Evolving theory and practice

slide-130
SLIDE 130

A Quick Summary

slide-131
SLIDE 131

A Quick Summary

Encryption

slide-132
SLIDE 132

A Quick Summary

Encryption Authentication

slide-133
SLIDE 133

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …)

slide-134
SLIDE 134

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND

slide-135
SLIDE 135

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ...

slide-136
SLIDE 136

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ...

slide-137
SLIDE 137

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures

slide-138
SLIDE 138

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, ..

slide-139
SLIDE 139

A Quick Summary

Encryption Authentication

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP)

slide-140
SLIDE 140

A Quick Summary

Encryption Authentication Multi-party 
 computation

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP)

slide-141
SLIDE 141

A Quick Summary

Encryption Authentication Multi-party 
 computation

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit

slide-142
SLIDE 142

A Quick Summary

Encryption Authentication Multi-party 
 computation

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-143
SLIDE 143

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-144
SLIDE 144

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-145
SLIDE 145

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-146
SLIDE 146

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-147
SLIDE 147

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation Funct.-Encryption

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-148
SLIDE 148

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation Funct.-Encryption Formal methods

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-149
SLIDE 149

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation Funct.-Encryption Formal methods Quantum crypto

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-150
SLIDE 150

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation Funct.-Encryption Formal methods Quantum crypto Lattices, Pairings,
 Multi-linear maps, Generic groups, Random Oracle

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions...

slide-151
SLIDE 151

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation Funct.-Encryption Formal methods Quantum crypto Lattices, Pairings,
 Multi-linear maps, Generic groups, Random Oracle

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions... Didn’ t cover: Cryptanalysis, Leakage- resilience, Oblivious RAM, Steganography, Game-theoretic crypto, ...

slide-152
SLIDE 152

Standardized

A Quick Summary

Encryption Authentication Multi-party 
 computation E-Cash Voting Fancy Signatures Obfuscation Funct.-Encryption Formal methods Quantum crypto Lattices, Pairings,
 Multi-linear maps, Generic groups, Random Oracle

SKE/PKE. (Also, Homomorphic Encryption, IBE, …) Security definitions: CPA/CCA, SIM & IND Abstractions: OWF/Hardcore bits, Trapdoor-OWP, ... Constructions: DDH, RSA, bilinear pairings, lattices, ... Hash functions, MACs, Digital Signatures Security definitions: Collision resistance (various), existential forgery, .. Constructions: Based on hash functions (also Random Oracles + Trapdoor-OWP) MPC: Oblivious Transfer, Commitment, ZK Proofs, Yao’ s garbled circuit Didn’ t cover: more protocols for general tasks, more efficient protocols for specific tasks, other security definitions... Didn’ t cover: Cryptanalysis, Leakage- resilience, Oblivious RAM, Steganography, Game-theoretic crypto, ...

slide-153
SLIDE 153

That’ s All Folks!

slide-154
SLIDE 154

That’ s All Folks!