quantum one-time programs

55
Quantum one-time programs Anne Broadbent Gus Gutoski Douglas Stebila ded abstract: Cryptology ePrint Archive, Report 201 full version (old): arXiv:1211.1080 [quant-ph] August 9, 2013, QCrypt, Waterloo

Upload: symona

Post on 05-Feb-2016

43 views

Category:

Documents


0 download

DESCRIPTION

Quantum one-time programs. Anne Broadbent Gus Gutoski Douglas Stebila. extended abstract: Cryptology ePrint Archive, Report 2013/343 full version (old): arXiv:1211.1080 [quant-ph]. August 9, 2013, QCrypt, Waterloo. What is a one-time program?. What is a one-time program?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Quantum one-time programs

Quantum one-time programsAnne Broadbent

Gus GutoskiDouglas Stebila

extended abstract: Cryptology ePrint Archive, Report 2013/343full version (old): arXiv:1211.1080 [quant-ph]

August 9, 2013, QCrypt, Waterloo

Page 2: Quantum one-time programs

What is a one-time program?

Page 3: Quantum one-time programs

What is a one-time program?

Page 4: Quantum one-time programs

What is a one-time program?

Page 5: Quantum one-time programs

What is a one-time program?

BANG!

Page 6: Quantum one-time programs

What is a one-time program?

Page 7: Quantum one-time programs

OTPs cannot be achieved by software

Page 8: Quantum one-time programs

Does quantum information suffice?

Ux Ux*

Page 9: Quantum one-time programs

What about secure hardware?

Page 10: Quantum one-time programs

Secure hardware: one-time memory

Page 11: Quantum one-time programs

Secure hardware: one-time memory

Page 12: Quantum one-time programs

Secure hardware: one-time memory

BANG!

Page 13: Quantum one-time programs

Secure hardware: one-time memory

Page 14: Quantum one-time programs

Advantages of one-time memories

Page 15: Quantum one-time programs

Non-interactive two-party computation

one-waycommunication

Page 16: Quantum one-time programs

Non-interactive two-party computation

Page 17: Quantum one-time programs

Non-interactive two-party computation

Page 18: Quantum one-time programs

Non-interactive two-party computation

BANG!

Page 19: Quantum one-time programs

Non-interactive two-party computation

Page 20: Quantum one-time programs

Why NI2PC?

Page 21: Quantum one-time programs

Quantum one-time programs

one-waycommunication

Page 22: Quantum one-time programs

Quantum one-time programs

Page 23: Quantum one-time programs

Quantum one-time programs

Page 24: Quantum one-time programs

Quantum one-time programs

Page 25: Quantum one-time programs

What’s known about classical OTPs

Page 26: Quantum one-time programs

Our primary result:

Page 27: Quantum one-time programs

Our primary result... in more detail

|i

|i|i

Page 28: Quantum one-time programs

Our primary result... in more detail

|i

|i|i

Page 29: Quantum one-time programs

Our primary result... in more detail

B|i

|i|i

Page 30: Quantum one-time programs

Our primary result... in more detail

B

|i

|i|i

Page 31: Quantum one-time programs

Completeness requirement

C

Page 32: Quantum one-time programs

Security requirement

SIMULATOR

Page 33: Quantum one-time programs

Security requirement

|i

|i|i

Page 34: Quantum one-time programs

Overview: honest receiver

Page 35: Quantum one-time programs

1. Use OTMs to build a reactive COTP

|i

|i

|i

Page 36: Quantum one-time programs

From OTMs to COTPs...

|i

|i

|i

Page 37: Quantum one-time programs

...and from COTPs to reactive COTPs

|i

|i

|i

Page 38: Quantum one-time programs

2. Quantum authentication schemes

TAMPERING

Page 39: Quantum one-time programs

3. Quantum computing on authentica-ted data (QCAD)

Page 40: Quantum one-time programs

Life is not that easy

Page 41: Quantum one-time programs

Life is not that easy

Page 42: Quantum one-time programs

Life is not that easy

See Michael Ben-Or’s talkfrom Wednesday

Page 43: Quantum one-time programs

Schemes that admit QCAD

Page 44: Quantum one-time programs

Schemes that admit QCAD

See Michael Ben-Or’s talkfrom Wednesday

Page 45: Quantum one-time programs

4. COTP for classical interaction

AB

C

Page 46: Quantum one-time programs

4. COTP for classical interaction

BA

C

How does the receivernon-interactively (de-)authenticate

his input without learningthe key??

Page 47: Quantum one-time programs

5. Teleport-through-(de)-authentication

trash

Page 48: Quantum one-time programs

A QOTP consists of:

|i|i

teleportauth

A

teleportde-auth

Page 49: Quantum one-time programs

Security: a simulator for our QOTP

|i|i

|i

SIMULATOR

Page 50: Quantum one-time programs

Simulator in pictures

|i|i

|i

A

Page 51: Quantum one-time programs

Trivial one-time programs

Page 52: Quantum one-time programs

Trivial one-time programs

f

Page 53: Quantum one-time programs

Unlockable classical functions

Page 54: Quantum one-time programs

Unlockable quantum channels

Page 55: Quantum one-time programs

The end

BANG!

extended abstract: Cryptology ePrint Archive, Report 2013/343full version (old): arXiv:1211.1080 [quant-ph]