8,997 research outputs found
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Quantum mechanics is about quantum information
I argue that quantum mechanics is fundamentally a theory about the
representation and manipulation of information, not a theory about the
mechanics of nonclassical waves or particles. The notion of quantum information
is to be understood as a new physical primitive -- just as, following
Einstein's special theory of relativity, a field is no longer regarded as the
physical manifestation of vibrations in a mechanical medium, but recognized as
a new physical primitive in its own right.Comment: 17 pages, forthcoming in Foundations of Physics Festschrift issue for
James Cushing. Revised version: some paragraphs have been added to the final
section clarifying the argument, and various minor clarifying remarks have
been added throughout the tex
Classical Cryptographic Protocols in a Quantum World
Cryptographic protocols, such as protocols for secure function evaluation
(SFE), have played a crucial role in the development of modern cryptography.
The extensive theory of these protocols, however, deals almost exclusively with
classical attackers. If we accept that quantum information processing is the
most realistic model of physically feasible computation, then we must ask: what
classical protocols remain secure against quantum attackers?
Our main contribution is showing the existence of classical two-party
protocols for the secure evaluation of any polynomial-time function under
reasonable computational assumptions (for example, it suffices that the
learning with errors problem be hard for quantum polynomial time). Our result
shows that the basic two-party feasibility picture from classical cryptography
remains unchanged in a quantum world.Comment: Full version of an old paper in Crypto'11. Invited to IJQI. This is
authors' copy with different formattin
Quantum key distribution and cryptography: a survey
I will try to partially answer, based on a review on recent work, the following question:
Can QKD and more generally quantum information be useful to cover some practical security requirements in current (and future) IT infrastructures ?
I will in particular cover the following topics
- practical performances of QKD
- QKD network deployment - SECOQC project
- Capabilities of QKD as a cryptographic primitive - comparative advantage with other solution, in order to cover practical security requirements
- Quantum information and Side-channels
- QKD security assurance
- Thoughts about "real" Post-Quantum Cryptograph
Universally Composable Quantum Multi-Party Computation
The Universal Composability model (UC) by Canetti (FOCS 2001) allows for
secure composition of arbitrary protocols. We present a quantum version of the
UC model which enjoys the same compositionality guarantees. We prove that in
this model statistically secure oblivious transfer protocols can be constructed
from commitments. Furthermore, we show that every statistically classically UC
secure protocol is also statistically quantum UC secure. Such implications are
not known for other quantum security definitions. As a corollary, we get that
quantum UC secure protocols for general multi-party computation can be
constructed from commitments
Quantum Tasks in Minkowski Space
The fundamental properties of quantum information and its applications to
computing and cryptography have been greatly illuminated by considering
information-theoretic tasks that are provably possible or impossible within
non-relativistic quantum mechanics. I describe here a general framework for
defining tasks within (special) relativistic quantum theory and illustrate it
with examples from relativistic quantum cryptography and relativistic
distributed quantum computation. The framework gives a unified description of
all tasks previously considered and also defines a large class of new questions
about the properties of quantum information in relation to Minkowski causality.
It offers a way of exploring interesting new fundamental tasks and
applications, and also highlights the scope for a more systematic understanding
of the fundamental information-theoretic properties of relativistic quantum
theory
- …