13 research outputs found
Nonlocality under Computational Assumptions
Nonlocality and its connections to entanglement are fundamental features of
quantum mechanics that have found numerous applications in quantum information
science. A set of correlations is said to be nonlocal if it cannot be
reproduced by spacelike-separated parties sharing randomness and performing
local operations. An important practical consideration is that the runtime of
the parties has to be shorter than the time it takes light to travel between
them. One way to model this restriction is to assume that the parties are
computationally bounded. We therefore initiate the study of nonlocality under
computational assumptions and derive the following results:
(a) We define the set (not-efficiently-local) as consisting of
all bipartite states whose correlations arising from local measurements cannot
be reproduced with shared randomness and \emph{polynomial-time} local
operations.
(b) Under the assumption that the Learning With Errors problem cannot be
solved in \emph{quantum} polynomial-time, we show that
, where is the set of \emph{all}
bipartite entangled states (pure and mixed). This is in contrast to the
standard notion of nonlocality where it is known that some entangled states,
e.g. Werner states, are local. In essence, we show that there exist (efficient)
local measurements producing correlations that cannot be reproduced through
shared randomness and quantum polynomial-time computation.
(c) We prove that if unconditionally, then
. In other words, the ability to certify all
bipartite entangled states against computationally bounded adversaries gives a
non-trivial separation of complexity classes.
(d) Using (c), we show that a certain natural class of 1-round delegated
quantum computation protocols that are sound against provers
cannot exist.Comment: 65 page
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions
Quantum public-key encryption [Gottesman; Kawachi et al., Eurocrypt’05] generalizes public-key encryption (PKE) by allowing the public keys to be quantum states. Prior work indicated that quantum PKE can be constructed from assumptions that are potentially weaker than those needed to realize its classical counterpart. In this work, we show that quantum PKE can be constructed from any quantum-secure one-way function. In contrast, classical PKE is believed to require more structured assumptions. Our construction is simple, uses only classical ciphertexts, and satisfies the strong notion of CCA security
Cryptanalysis of Plantlet
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in \texttt{IACR ToSC} 2017. It has a Grain-like structure with two state registers of size and bits. In spite of this, the cipher does not seem to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design. The cipher uses a 80-bit secret key and a 90-bit IV.
In this paper, we first present a key recovery attack on Plantlet that requires around Plantlet encryptions. The attack leverages the fact that two internal states of Plantlet that differ in the 43rd LFSR location are guaranteed to produce keystream that are either equal or unequal in 45 locations with probability 1. Thus an attacker can with some probability guess that when 2 segments of keystream blocks possess the 45 bit difference just mentioned, they have been produced by two internal states that differ only in the 43rd LFSR location. Thereafter by solving a system of polynomial equations representing the keystream bits, the attacker can find the secret key if his guess was indeed correct, or reach some kind of contradiction if his guess was incorrect. In the latter event, he would repeat the procedure for other keystream blocks with the given difference. We show that the process when repeated a finite number of times, does indeed yield the value of the secret key.
In the second part of the paper, we observe that the previous attack was limited to internal state differences that occurred at time instances that were congruent to . We further observe that by generalizing the attack to include internal state differences that are congruent to all equivalence classed modulo 80, we lower the total number of keystream bits required to perform the attack and in the process reduce the attack complexity to Plantlet encryptions
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair
Cryptanalysis of the LowMC block cipher when the attacker has access to a single known
plaintext/ciphertext pair is a mathematically challenging problem. This is because the attacker
is unable to employ most of the standard techniques in symmetric cryptography like linear and differential
cryptanalysis. This scenario is particularly relevant while arguing the security of the \picnic digital
signature scheme in which the plaintext/ciphertext pair generated by the LowMC block cipher serves as the
public (verification) key and the corresponding LowMC encryption key also serves as the secret (signing) key
of the signature scheme. In the paper by Banik et al. (IACR ToSC 2020:4), the authors used a linearization
technique of the LowMC S-box to mount attacks on some instances of the block cipher. In this paper, we first make a more precise complexity analysis of the linearization attack. Then, we
show how to perform a 2-stage MITM attack on LowMC. The first stage reduces the key candidates corresponding
to a fraction of key bits of the master key. The second MITM stage between this reduced candidate set and the
remaining fraction of key bits successfully recovers the master key. We show that the combined computational
complexity of both these stages is significantly lower than those reported in the ToSC paper by Banik et al
Memory-Efficient Single Data-Complexity Attacks on LowMC Using Partial Sets
The LowMC family of block ciphers was first proposed by Albrecht et al. in [ARS+15], specifically targeting adoption in FHE and MPC applications due to its low multiplicative complexity. The construction operates a 3-bit S-box as the sole non-linear transformation in the algorithm. In contrast, both the linear layer and round key generation are achieved through multiplications of full rank matrices over GF(2). The cipher is instantiable using a diverse set of default configurations, some of which have partial non-linear layers i.e., in which the S-boxes are not applied over the entire internal state of the cipher.
The significance of cryptanalysing LowMC was elevated by its inclusion into the NIST PQC digital signature scheme PICNIC in which a successful key recovery using a single plaintext/ciphertext pair is akin to retrieving the secret signing key. The current state-of-the-art attack in this setting is due to Dinur [Din21a], in which a novel way of enumerating the roots of a Boolean system of equation is morphed into a key recovery procedure that undercuts an ordinary exhaustive search in terms of time complexity for the variants of the cipher up to five rounds.
In this work, we demonstrate that this technique can efficiently be enriched with a specific linearization strategy that reduces the algebraic degree of the non-linear layer as put forward by Banik et al. [BBDV20]. This amalgamation yields a drastic reduction in terms of memory complexity across all instantiations of LowMC up to six rounds with a quasi-equivalent time complexity
On Active Attack Detection in Messaging with Immediate Decryption
The widely used Signal protocol provides protection against state exposure attacks through forward security (protecting past messages) and post-compromise security (for restoring security). It supports immediate decryption, allowing messages to be re-ordered or dropped at the protocol level without affecting correctness. In this work, we consider strong active attack detection for secure messaging with immediate decryption, where parties are able to immediately detect active attacks under certain conditions. We first consider in-band active attack detection, where participants who have been actively compromised but are still able to send a single message to their partner can detect the compromise. We propose two complementary notions to capture security, and present a compiler that provides security with respect to both notions. Our notions generalise existing work (RECOVER security) which only supported in-order messaging. We also study the related out-of-band attack detection problem by considering communication over out-of-band, authenticated channels and propose analogous security notions. We prove that one of our two notions in each setting imposes a linear communication overhead in the number of sent messages and security parameter using an information-theoretic argument. This implies that each message must information-theoretically contain all previous messages and that our construction, that essentially attaches the entire message history to every new message, is asymptotically optimal. We then explore ways to bypass this lower bound and highlight the feasibility of practical active attack detection compatible with immediate decryption
Public-Key Encryption with Quantum Keys
In the framework of Impagliazzo's five worlds, a distinction is often made
between two worlds, one where public-key encryption exists (Cryptomania), and
one in which only one-way functions exist (MiniCrypt). However, the boundaries
between these worlds can change when quantum information is taken into account.
Recent work has shown that quantum variants of oblivious transfer and
multi-party computation, both primitives that are classically in Cryptomania,
can be constructed from one-way functions, placing them in the realm of quantum
MiniCrypt (the so-called MiniQCrypt). This naturally raises the following
question: Is it possible to construct a quantum variant of public-key
encryption, which is at the heart of Cryptomania, from one-way functions or
potentially weaker assumptions?
In this work, we initiate the formal study of the notion of quantum
public-key encryption (qPKE), i.e., public-key encryption where keys are
allowed to be quantum states. We propose new definitions of security and
several constructions of qPKE based on the existence of one-way functions
(OWF), or even weaker assumptions, such as pseudorandom function-like states
(PRFS) and pseudorandom function-like states with proof of destruction
(PRFSPD). Finally, to give a tight characterization of this primitive, we show
that computational assumptions are necessary to build quantum public-key
encryption. That is, we give a self-contained proof that no quantum public-key
encryption scheme can provide information-theoretic security.Comment: This submission subsumes arXiv:2303.02080 and arXiv:2303.0536
Public-Key Encryption with Quantum Keys
In the framework of Impagliazzo\u27s five worlds, a distinction is often made
between two worlds, one where public-key encryption exists (Cryptomania),
and one in which only one-way functions exist (MiniCrypt). However, the boundaries between these worlds can change when quantum information is taken into account. Recent work has shown that quantum variants of oblivious transfer and multi-party computation, both primitives that are classically in Cryptomania, can be constructed from one-way functions, placing them in the realm of quantum MiniCrypt (the so-called MiniQCrypt).
This naturally raises the following question: Is it possible to construct a quantum variant of public-key encryption, which is at the heart of Cryptomania, from one-way functions or potentially weaker assumptions? In this work, we initiate the formal study of the notion of quantum public-key encryption (qPKE), i.e., public-key encryption where keys are allowed to be quantum states. We propose new definitions of security and several constructions of qPKE based on the existence of one-way functions (OWF), or even weaker assumptions, such as pseudorandom function-like states (PRFS) and pseudorandom function-like states with proof of destruction (PRFSPD). Finally, to give a tight characterization of this primitive, we show that computational assumptions are necessary to build quantum public-key encryption. That is, we give a self-contained proof that no quantum public-key encryption scheme can provide information-theoretic security
Cryptanalysis of Plantlet
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Muller in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 40 and 61 bits. In spite of this, the cipher does not seem to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design. The cipher uses a 80-bit secret key and a 90-bit IV. In this paper, we first present a key recovery attack on Plantlet that requires around 2^{76.26} Plantlet encryptions. The attack leverages the fact that two internal states of Plantlet that differ in the 43rd LFSR location are guaranteed to produce keystream that are either equal or unequal in 45 locations with probability 1. Thus an attacker can with some probability guess that when 2 segments of keystream blocks possess the 45 bit difference just mentioned, they have been produced by two internal states that differ only in the 43rd LFSR location. Thereafter by solving a system of polynomial equations representing the keystream bits, the attacker can find the secret key if his guess was indeed correct, or reach some kind of contradiction if his guess was incorrect. In the latter event, he would repeat the procedure for other keystream blocks with the given difference. We show that the process when repeated a finite number of times, does indeed yield the value of the secret key. In the second part of the paper, we observe that the previous attack was limited to internal state differences that occurred at time instances that were congruent to 0 mod 80. We further observe that by generalizing the attack to include internal state differences that are congruent to all equivalence classed modulo 80, we lower the total number of keystream bits required to perform the attack and in the process reduce the attack complexity to 2^{69.98} Plantlet encryptions
Cryptanalysis of Plantlet
Plantlet is a lightweight stream cipher designed by Mikhalev, Armknecht and Müller in IACR ToSC 2017. It has a Grain-like structure with two state registers of size 40 and 61 bits. In spite of this, the cipher does not seem to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design. The cipher uses a 80-bit secret key and a 90-bit IV. In this paper, we first present a key recovery attack on Plantlet that requires around 276.26 Plantlet encryptions. The attack leverages the fact that two internal states of Plantlet that differ in the 43rd LFSR location are guaranteed to produce keystream that are either equal or unequal in 45 locations with probability 1. Thus an attacker can with some probability guess that when 2 segments of keystream blocks possess the 45 bit difference just mentioned, they have been produced by two internal states that differ only in the 43rd LFSR location. Thereafter by solving a system of polynomial equations representing the keystream bits, the attacker can find the secret key if his guess was indeed correct, or reach some kind of contradiction if his guess was incorrect. In the latter event, he would repeat the procedure for other keystream blocks with the given difference. We show that the process when repeated a finite number of times, does indeed yield the value of the secret key.
In the second part of the paper, we observe that the previous attack was limited to internal state differences that occurred at time instances that were congruent to 0 mod 80. We further observe that by generalizing the attack to include internal state differences that are congruent to all equivalence classed modulo 80, we lower the total number of keystream bits required to perform the attack and in the process reduce the attack complexity to 269.98 Plantlet encryptions