54 research outputs found
Non-Destructive Zero-Knowledge Proofs on Quantum States, and Multi-Party Generation of Authorized Hidden GHZ States
Due to the special no-cloning principle, quantum states appear to be very
useful in cryptography. But this very same property also has drawbacks: when
receiving a quantum state, it is nearly impossible for the receiver to
efficiently check non-trivial properties on that state without destroying it.
In this work, we initiate the study of Non-Destructive Zero-Knowledge Proofs
on Quantum States. Our method binds a quantum state to a classical encryption
of that quantum state. That way, the receiver can obtain guarantees on the
quantum state by asking to the sender to prove properties directly on the
classical encryption. This method is therefore non-destructive, and it is
possible to verify a very large class of properties. For instance, we can force
the sender to send different categories of states depending on whether they
know a classical password or not. Moreover, we can also provide guarantees to
the sender: for example, we can ensure that the receiver will never learn
whether the sender knows the password or not.
We also extend this method to the multi-party setting. We show how it can
prove useful to distribute a GHZ state between different parties, in such a way
that only parties knowing a secret can be part of this GHZ. Moreover, the
identity of the parties that are part of the GHZ remains hidden to any
malicious party. A direct application would be to allow a server to create a
secret sharing of a qubit between unknown parties, authorized for example by a
third party Certification Authority.
Finally, we provide simpler "blind" versions of the protocols that could
prove useful in Anonymous Transmission or Quantum Onion Routing, and we
explicit a cryptographic function required in our protocols based on the
Learning With Errors hardness problem.Comment: 50 page
On the Possibility of Classical Client Blind Quantum Computing
Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to the client but remains hidden from the server. This primitive has many applications, most prominently, it makes blind quantum computing possible for classical clients. In this work, we give a protocol for classical client remote state preparation, that requires minimal resources. The protocol is proven secure against honest-but-curious servers and any malicious third party in a game-based security framework. We provide an instantiation of a trapdoor (approximately) 2-regular family of functions whose security is based on the hardness of the Learning-With-Errors problem, including a first analysis of the set of usable parameters. We also run an experimentation on IBM’s quantum cloud using a toy function. This is the first proof-of-principle experiment of classical client remote state preparation
Oblivious Transfer from Zero-Knowledge Proofs, or How to Achieve Round-Optimal Quantum Oblivious Transfer and Zero-Knowledge Proofs on Quantum States
We provide a generic construction to turn any classical Zero-Knowledge (ZK) protocol into a composable (quantum) oblivious transfer (OT) protocol, mostly lifting the round-complexity properties and security guarantees (plain-model/statistical security/unstructured functions…) of the ZK protocol to the resulting OT protocol. Such a construction is unlikely to exist classically as Cryptomania is believed to be different from Minicrypt.
In particular, by instantiating our construction using Non-Interactive ZK (NIZK), we provide the first round-optimal (2-message) quantum OT protocol secure in the random oracle model, and round-optimal extensions to string and -out-of- OT.
At the heart of our construction lies a new method that allows us to prove properties on a received quantum state without revealing (too much) information on it, even in a non-interactive way and/or with statistical guarantees when using an appropriate classical ZK protocol. We can notably prove that a state has been partially measured (with arbitrary constraints on the set of measured qubits), without revealing any additional information on this set. This notion can be seen as an analog of ZK to quantum states, and we expect it to be of independent interest as it extends complexity theory to quantum languages, as illustrated by the two new complexity classes we introduce, ZKstateQIP and ZKstateQMA
QFactory: classically-instructed remote secret qubits preparation
The functionality of classically-instructed remotely prepared random secret
qubits was introduced in (Cojocaru et al 2018) as a way to enable classical
parties to participate in secure quantum computation and communications
protocols. The idea is that a classical party (client) instructs a quantum
party (server) to generate a qubit to the server's side that is random, unknown
to the server but known to the client. Such task is only possible under
computational assumptions. In this contribution we define a simpler (basic)
primitive consisting of only BB84 states, and give a protocol that realizes
this primitive and that is secure against the strongest possible adversary (an
arbitrarily deviating malicious server). The specific functions used, were
constructed based on known trapdoor one-way functions, resulting to the
security of our basic primitive being reduced to the hardness of the Learning
With Errors problem. We then give a number of extensions, building on this
basic module: extension to larger set of states (that includes non-Clifford
states); proper consideration of the abort case; and verifiablity on the module
level. The latter is based on "blind self-testing", a notion we introduced,
proved in a limited setting and conjectured its validity for the most general
case.Comment: 51 pages, 4 figure
Follicular B Lymphomas Generate Regulatory T Cells via the ICOS/ICOSL Pathway and Are Susceptible to Treatment by Anti-ICOS/ICOSL Therapy
Abstract
The prognosis of follicular lymphoma (FL) patients is suspected to be influenced by tumor-infiltrating regulatory T cells (Treg). The mechanism of Treg enrichment in FL and their impact on malignant FL B cells remains to be elucidated. We analyzed 46 fresh lymph node biopsy samples, including FL (n = 20), diffuse large B-cell lymphoma (n = 10), classical Hodgkin lymphoma (n = 9), and reactive lymphadenitis (n = 7). Using multicolor flow cytometry and cell sorting, we observed an accumulation of CD25highCD127low/neg Tregs in FL tissues. These Tregs comprised activated ICOS+ Tregs that were able to suppress not only conventional T cells, but also FL B cells. These FL B cells were able to express ICOSL in vitro and to generate CD25highFoxP3high Tregs expressing ICOS. Treg generation was associated with ICOS/ICOSL engagement and was abrogated by antagonist anti-ICOS and anti-ICOSL antibodies. Interactions between Tregs and FL B cells resulted in ICOSL downregulation on FL B cells. Our results highlight a key role for Tregs in FL pathogenesis and suggest that targeting the ICOS/ICOSL pathway may be a promising immunotherapy for FL treatment. Cancer Res; 76(16); 4648–60. ©2016 AACR.</jats:p
Étude des protocoles entre clients classiques et serveur quantique
Quantum computers promise surprising powers of computation by exploiting the stunning physical properties of infinitesimally small particles. I focused on designing and proving the security of protocols that allow a purely classical client to use the computational resources of a quantum server, so that the performed computation is never revealed to the server. To this end, I develop a modular tool to generate on a remote server a quantum state that only the client is able to describe, and I show how multi-qubits quantum states can be generated more efficiently. I also prove that there is no such protocol that is secure in a generally composable model of security, including when our module is used in the UBQC protocol. In addition to delegated computation, this tool also proves to be useful for performing a task that might seem impossible to achieve at first sight: proving advanced properties on a quantum state in a non-interactive and non-destructive way, including when this state is generated collaboratively by several participants. This can be seen as a quantum analogue of the classical Non-Interactive Zero-Knowledge proofs. This property is particularly useful to filter the participants of a protocol without revealing their identity, and may have applications in other domains, for example to transmit a quantum state over a network while hiding the source and destination of the message. Finally, I discuss my ongoing independent work on One-Time Programs, mixing quantum cryptography, error correcting codes and information theory.Les ordinateurs quantiques promettent de surprenantes puissances de calcul en exploitant les étonnantes propriétés de particules infiniment petites. Je m'applique à prouver la sécurité de protocoles permettant à un client purement classique d'utiliser les ressources calculatoires d'un serveur quantique, de manière à ce que le calcul effectué ne soit jamais révélé au serveur. À cette fin, je développe un outil modulaire permettant de générer sur un serveur distant un état quantique que seul le client est en capacité de décrire, et je montre comment on peut générer plus efficacement des états quantiques sur plusieurs qubits. Je prouve également qu'il n'existe pas de protocoles de ce type qui soit sécurisé dans un modèle de sécurité généralement composable, y compris lorsque ce module est utilisé dans le protocole UBQC. Outre le calcul délégué, cet outil s’avère également être utile pour effectuer une tache qui pourrait paraître impossible à réaliser de prime abord: prouver des propriétés avancées sur un état quantique de manière non-interactive (un seul message est envoyé) et non-destructive (l'état quantique reçu est intact), y compris lorsque cet état est généré collaborativement par plusieurs participants. Cette propriété s'avère en particulier utile pour pouvoir filtrer les participants dans un protocole sans révéler leur identité, et peut avoir des applications dans d'autres domaines, par exemple pour transmettre un état quantique sur un réseau tout en cachant la source et la destination du message. Enfin, je discute de mes travaux indépendants en cours sur les programmes à usage unique, mêlant cryptographie quantique, codes correcteurs et théorie de l'information
Étude des protocoles entre clients classiques et serveur quantique
Les ordinateurs quantiques promettent de surprenantes puissances de calcul en exploitant les étonnantes propriétés de particules infiniment petites. Je m'applique à prouver la sécurité de protocoles permettant à un client purement classique d'utiliser les ressources calculatoires d'un serveur quantique, de manière à ce que le calcul effectué ne soit jamais révélé au serveur. À cette fin, je développe un outil modulaire permettant de générer sur un serveur distant un état quantique que seul le client est en capacité de décrire, et je montre comment on peut générer plus efficacement des états quantiques sur plusieurs qubits. Je prouve également qu'il n'existe pas de protocoles de ce type qui soit sécurisé dans un modèle de sécurité généralement composable, y compris lorsque ce module est utilisé dans le protocole UBQC. Outre le calcul délégué, cet outil s’avère également être utile pour effectuer une tache qui pourrait paraître impossible à réaliser de prime abord: prouver des propriétés avancées sur un état quantique de manière non-interactive (un seul message est envoyé) et non-destructive (l'état quantique reçu est intact), y compris lorsque cet état est généré collaborativement par plusieurs participants. Cette propriété s'avère en particulier utile pour pouvoir filtrer les participants dans un protocole sans révéler leur identité, et peut avoir des applications dans d'autres domaines, par exemple pour transmettre un état quantique sur un réseau tout en cachant la source et la destination du message. Enfin, je discute de mes travaux indépendants en cours sur les programmes à usage unique, mêlant cryptographie quantique, codes correcteurs et théorie de l'information.Quantum computers promise surprising powers of computation by exploiting the stunning physical properties of infinitesimally small particles. I focused on designing and proving the security of protocols that allow a purely classical client to use the computational resources of a quantum server, so that the performed computation is never revealed to the server. To this end, I develop a modular tool to generate on a remote server a quantum state that only the client is able to describe, and I show how multi-qubits quantum states can be generated more efficiently. I also prove that there is no such protocol that is secure in a generally composable model of security, including when our module is used in the UBQC protocol. In addition to delegated computation, this tool also proves to be useful for performing a task that might seem impossible to achieve at first sight: proving advanced properties on a quantum state in a non-interactive and non-destructive way, including when this state is generated collaboratively by several participants. This can be seen as a quantum analogue of the classical Non-Interactive Zero-Knowledge proofs. This property is particularly useful to filter the participants of a protocol without revealing their identity, and may have applications in other domains, for example to transmit a quantum state over a network while hiding the source and destination of the message. Finally, I discuss my ongoing independent work on One-Time Programs, mixing quantum cryptography, error correcting codes and information theory
zx-calculus: zx-calculus with tikz: Manual of the zx-calculus latex package
International audienceManual of the zx-calculus latex package, an extensive library to draw zx-calculus in LaTeX
La sensibilisation aux violences sexistes et sexuelles en Belgique francophone et en France :du contenu aux rédactions
info:eu-repo/semantics/nonPublishe
- …
