13 research outputs found

    Key Agreement Against Quantum Adversaries

    Full text link
    Key agreement is a cryptographic scenario between two legitimate parties, who need to establish a common secret key over a public authenticated channel, and an eavesdropper who intercepts all their messages in order to learn the secret. We consider query complexity in which we count only the number of evaluations (queries) of a given black-box function, and classical communication channels. Ralph Merkle provided the first unclassified scheme for secure communications over insecure channels. When legitimate parties are willing to ask O(N) queries for some parameter N, any classical eavesdropper needs Omega(N^2) queries before being able to learn their secret, which is is optimal. However, a quantum eavesdropper can break this scheme in O(N) queries. Furthermore, it was conjectured that any scheme, in which legitimate parties are classical, could be broken in O(N) quantum queries. In this thesis, we introduce protocols Ă  la Merkle that fall into two categories. When legitimate parties are restricted to use classical computers, we offer the first secure classical scheme. It requires Omega(N^{13/12}) queries of a quantum eavesdropper to learn the secret. We give another protocol having security of Omega(N^{7/6}) queries. Furthermore, for any k>= 2, we introduce a classical protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1/2+k/{k+1}}) queries, approaching Theta(N^{3/2}) when k increases. When legitimate parties are provided with quantum computers, we present two quantum protocols improving on the best known scheme before this work. Furthermore, for any k>= 2, we give a quantum protocol in which legitimate parties establish a secret in O(N) queries while the optimal quantum eavesdropping strategy requires Theta(N^{1+{k}/{k+1}})} queries, approaching Theta(N^{2}) when k increases.Un protocole d'Ă©change de clĂ©s est un scĂ©nario cryptographique entre deux partis lĂ©gitimes ayant besoin de se mettre d'accord sur une clĂ© commune secrĂšte via un canal public authentifiĂ© oĂč tous les messages sont interceptĂ©s par un espion voulant connaĂźtre leur secret. Nous considĂ©rons un canal classique et mesurons la complexitĂ© de calcul en termes du nombre d'Ă©valuations (requĂȘtes) d'une fonction donnĂ©e par une boĂźte noire. Ralph Merkle fut le premier Ă  proposer un schĂ©ma non classifiĂ© permettant de rĂ©aliser des Ă©changes securisĂ©s avec des canaux non securisĂ©s. Lorsque les partis lĂ©gitimes sont capables de faire O(N) requĂȘtes pour un certain paramĂštre N, tout espion classique doit faire Omega(N^2) requĂȘtes avant de pouvoir apprendre leur secret, ce qui est optimal. Cependant, un espion quantique peut briser ce schĂ©ma avec O(N) requĂȘtes. D'ailleurs, il a Ă©tĂ© conjecturĂ© que tout protocole, dont les partis lĂ©gitimes sont classiques, pourrait ĂȘtre brisĂ© avec O(N) requĂȘtes quantiques. Dans cette thĂšse, nous introduisons deux catĂ©gories des protocoles Ă  la Merkle. Lorsque les partis lĂ©gitimes sont restreints Ă  l'utilisation des ordinateurs classiques, nous offrons le premier schĂ©ma classique sĂ»r. Il oblige tout adversaire quantique Ă  faire Omega(N^{13/12}) requĂȘtes avant d'apprendre le secret. Nous offrons aussi un protocole ayant une sĂ©curitĂ© de Omega(N^{7/6}) requĂȘtes. En outre, pour tout k >= 2, nous donnons un protocole classique pour lequel les partis lĂ©gitimes Ă©tablissent un secret avec O(N) requĂȘtes alors que la stratĂ©gie optimale d'espionnage quantique nĂ©cessite Theta(N^{1/2 + k/{k +1}}) requĂȘtes, se rapprochant de Theta(N^{3/2}) lorsque k croĂźt. Lors les partis lĂ©gitimes sont Ă©quipĂ©s d'ordinateurs quantiques, nous prĂ©sentons deux protocoles supĂ©rieurs au meilleur schĂ©ma connu avant ce travail. En outre, pour tout k >= 2, nous offrons un protocole quantique pour lequel les partis lĂ©gitimes Ă©tablissent un secret avec O(N) requĂȘtes alors que l'espionnage quantique optimale nĂ©cessite Theta(N^{1+{k}/{k+1}}) requĂȘtes, se rapprochant de Theta(N^{2}) lorsque k croĂźt

    Proceedings of The Multi-Agent Logics, Languages, and Organisations Federated Workshops (MALLOW 2010)

    Get PDF
    http://ceur-ws.org/Vol-627/allproceedings.pdfInternational audienceMALLOW-2010 is a third edition of a series initiated in 2007 in Durham, and pursued in 2009 in Turin. The objective, as initially stated, is to "provide a venue where: the cost of participation was minimum; participants were able to attend various workshops, so fostering collaboration and cross-fertilization; there was a friendly atmosphere and plenty of time for networking, by maximizing the time participants spent together"

    NOTIFICATION !!!

    Get PDF
    All the content of this special edition is retrieved from the conference proceedings published by the European Scientific Institute, ESI. http://eujournal.org/index.php/esj/pages/view/books The European Scientific Journal, ESJ, after approval from the publisher re publishes the papers in a Special edition

    NOTIFICATION !!!

    Get PDF
    All the content of this special edition is retrieved from the conference proceedings published by the European Scientific Institute, ESI. http://eujournal.org/index.php/esj/pages/view/books The European Scientific Journal, ESJ, after approval from the publisher re publishes the papers in a Special edition

    NOTIFICATION!!!

    Get PDF
    The full content of this special edition is retrieved from the conference proceedings published by the European Scientific Institute, ESI. http://eujournal.org/index.php/esj/pages/view/books The European Scientific Journal, ESJ, after approval from the publisher re publishes the papers in a Special edition

    NOTIFICATION !!!

    Get PDF
    All the content of this special edition is retrieved from the conference proceedings published by the European Scientific Institute, ESI. http://eujournal.org/index.php/esj/pages/view/books The European Scientific Journal, ESJ, after approval from the publisher re publishes the papers in a Special edition

    NOTIFICATION !!!

    Get PDF
    All the content of this special edition is retrieved from the conference proceedings published by the European Scientific Institute, ESI. http://eujournal.org/index.php/esj/pages/view/books The European Scientific Journal, ESJ, after approval from the publisher re publishes the papers in a Special edition
    corecore