498 research outputs found
Making Classical Ground State Spin Computing Fault-Tolerant
We examine a model of classical deterministic computing in which the ground
state of the classical system is a spatial history of the computation. This
model is relevant to quantum dot cellular automata as well as to recent
universal adiabatic quantum computing constructions. In its most primitive
form, systems constructed in this model cannot compute in an error free manner
when working at non-zero temperature. However, by exploiting a mapping between
the partition function for this model and probabilistic classical circuits we
are able to show that it is possible to make this model effectively error free.
We achieve this by using techniques in fault-tolerant classical computing and
the result is that the system can compute effectively error free if the
temperature is below a critical temperature. We further link this model to
computational complexity and show that a certain problem concerning finite
temperature classical spin systems is complete for the complexity class
Merlin-Arthur. This provides an interesting connection between the physical
behavior of certain many-body spin systems and computational complexity.Comment: 24 pages, 1 figur
Spatial and spatio-temporal patterns in a cell-haptotaxis model
We investigate a cell-haptotaxis model for the generation of spatial and spatio-temporal patterns in one dimension. We analyse the steady state problem for specific boundary conditions and show the existence of spatially hetero-geneous steady states. A linear analysis shows that stability is lost through a Hopf bifurcation. We carry out a nonlinear multi-time scale perturbation procedure to study the evolution of the resulting spatio-temporal patterns. We also analyse the model in a parameter domain wherein it exhibits a singular dispersion relation
Fully Deniable Interactive Encryption
Deniable encryption (Canetti et al., Crypto 1996) enhances secret communication over public channels, providing the additional guarantee that the secrecy of communication is protected even if the parties are later coerced (or willingly bribed) to expose their entire internal states: plaintexts, keys and randomness.
To date, constructions of deniable encryption --- and more generally, interactive deniable communication --- only address restricted cases where only one party is compromised (Sahai and Waters, STOC 2014). The main question --- whether deniable communication is at all possible if both parties are coerced at once --- has remained open.
We resolve this question in the affirmative, presenting a communication protocol that is fully deniable under coercion of both parties.
Our scheme has three rounds, assumes subexponentially secure indistinguishability obfuscation and one-way functions, and uses a short global reference string that is generated once at system set-up and suffices for an unbounded number of encryptions and decryptions.
Of independent interest, we introduce a new notion called off-the-record deniability, which protects parties even when their claimed internal states are inconsistent (a case not covered by prior definitions). Our scheme satisfies both standard deniability and off-the-record deniability
Quantum algorithm and circuit design solving the Poisson equation
The Poisson equation occurs in many areas of science and engineering. Here we
focus on its numerical solution for an equation in d dimensions. In particular
we present a quantum algorithm and a scalable quantum circuit design which
approximates the solution of the Poisson equation on a grid with error
\varepsilon. We assume we are given a supersposition of function evaluations of
the right hand side of the Poisson equation. The algorithm produces a quantum
state encoding the solution. The number of quantum operations and the number of
qubits used by the circuit is almost linear in d and polylog in
\varepsilon^{-1}. We present quantum circuit modules together with performance
guarantees which can be also used for other problems.Comment: 30 pages, 9 figures. This is the revised version for publication in
New Journal of Physic
Universally Convertible Directed Signatures
Many variants of Chaum and van Antwerpen's undeniable signatures have been proposed to achieve specific properties desired in real-world applications of cryptography. Among them, directed signatures were introduced by Lim and Lee in 1993. Directed signatures differ from the well-known confirmer signatures in that the signer has the simultaneous abilities to confirm, deny and individually convert a signature. The universal conversion of these signatures has remained an open problem since their introduction in 1993. This paper provides a positive answer to this quest by showing a very efficient design for universally convertible directed signatures (UCDS) both in terms of computational complexity and signature size. Our construction relies on the so-called xyz-trick applicable to bilinear map groups. We define proper security notions for UCDS schemes and show that our construction is secure, in the random oracle model, under computational assumptions close to the CDH and DDH assumptions. Finally, we introduce and realize traceable universally convertible directed signatures where a master tracing key allows to link signatures to their direction
The Hilbertian Tensor Norm and Entangled Two-Prover Games
We study tensor norms over Banach spaces and their relations to quantum
information theory, in particular their connection with two-prover games. We
consider a version of the Hilbertian tensor norm and its dual
that allow us to consider games with arbitrary output alphabet
sizes. We establish direct-product theorems and prove a generalized
Grothendieck inequality for these tensor norms. Furthermore, we investigate the
connection between the Hilbertian tensor norm and the set of quantum
probability distributions, and show two applications to quantum information
theory: firstly, we give an alternative proof of the perfect parallel
repetition theorem for entangled XOR games; and secondly, we prove a new upper
bound on the ratio between the entangled and the classical value of two-prover
games.Comment: 33 pages, some of the results have been obtained independently in
arXiv:1007.3043v2, v2: an error in Theorem 4 has been corrected; Section 6
rewritten, v3: completely rewritten in order to improve readability; title
changed; references added; published versio
Composability in quantum cryptography
In this article, we review several aspects of composability in the context of
quantum cryptography. The first part is devoted to key distribution. We discuss
the security criteria that a quantum key distribution protocol must fulfill to
allow its safe use within a larger security application (e.g., for secure
message transmission). To illustrate the practical use of composability, we
show how to generate a continuous key stream by sequentially composing rounds
of a quantum key distribution protocol. In a second part, we take a more
general point of view, which is necessary for the study of cryptographic
situations involving, for example, mutually distrustful parties. We explain the
universal composability framework and state the composition theorem which
guarantees that secure protocols can securely be composed to larger
applicationsComment: 18 pages, 2 figure
Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound
Order-preserving encryption emerged as a key ingredient underlying the security of practical database management systems. Boldyreva et al. (EUROCRYPT \u2709) initiated the study of its security by introducing two natural notions of security. They proved that their first notion, a ``best-possible\u27\u27 relaxation of semantic security allowing ciphertexts to reveal the ordering of their corresponding plaintexts, is not realizable. Later on Boldyreva et al. (CRYPTO \u2711) proved that any scheme satisfying their second notion, indistinguishability from a random order-preserving function, leaks about half of the bits of a random plaintext.
This unsettling state of affairs was recently changed by Chenette et al. (FSE \u2716), who relaxed the above ``best-possible\u27\u27 notion and constructed a scheme satisfying it based on any pseudorandom function. In addition to revealing the ordering of any two encrypted plaintexts, ciphertexts in their scheme reveal only the position of the most significant bit on which the plaintexts differ. A significant drawback of their scheme, however, is its substantial ciphertext expansion: Encrypting plaintexts of length bits results in ciphertexts of length bits, where determines the level of security (e.g., in practice).
In this work we prove a lower bound on the ciphertext expansion of any order-preserving encryption scheme satisfying the ``limited-leakage\u27\u27 notion of Chenette et al. with respect to non-uniform polynomial-time adversaries, matching the ciphertext expansion of their scheme up to lower-order terms. This improves a recent result of Cash and Zhang (ePrint \u2717), who proved such a lower bound for schemes satisfying this notion with respect to computationally-unbounded adversaries (capturing, for example, schemes whose security can be proved in the random-oracle model without relying on cryptographic assumptions). Our lower bound applies, in particular, to schemes whose security is proved in the standard model
Round-optimal Black-box Commit-and-prove with Succinct Communication
We give a four-round black-box construction of a commit-and-prove protocol with succinct communication. Our construction is WI and has constant soundness error, and it can be upgraded into a one that is ZK and has negligible soundness error by relying on a round-preserving transformation of Khurana et al. (TCC 2018). Our construction is obtained by combining the MPC-in-the-head technique of Ishai et al. (SICOMP 2009) with the two-round succinct argument of Kalai et al. (STOC 2014), and the main technical novelty lies in the analysis of the soundness---we show that, although the succinct argument of Kalai et al. does not necessarily provide soundness for NP statements, it can be used in the MPC-in-the-head technique for proving the consistency of committed MPC views. Our construction is based on sub-exponentially hard collision-resistant hash functions, two-round PIRs, and two-round OTs
Witness Indistinguishability for any Single-Round Argument with Applications to Access Control
Consider an access policy for some resource which only allows access to users
of the system who own a certain set of attributes. Specifically, we consider
the case where such an access structure is defined by some monotone
function , belonging to some class of function
(e.g.\ conjunctions, space bounded computation), where is the number of
possible attributes.
In this work we show that any succinct single-round delegation scheme for the
function class can be converted into a succinct single-round
private access control protocol. That is, a verifier can be convinced
that an approved user (i.e.\ one which holds an approved set of attributes) is
accessing the system, without learning any additional information about the
user or the set of attributes.
As a main tool of independent interest, we show that assuming a
quasi-polynomially secure two-message oblivious transfer scheme with
statistical sender privacy (which can be based on quasi-polynomial hardness of
the DDH, QR, DCR or LWE assumptions), we can convert any single-round
protocol into a witness indistinguishable one, with similar
communication complexity
- …