1
|
Neves S, Yacoub V, Chabaud U, Bozzio M, Kerenidis I, Diamanti E. Experimental cheat-sensitive quantum weak coin flipping. Nat Commun 2023; 14:1855. [PMID: 37012243 PMCID: PMC10070430 DOI: 10.1038/s41467-023-37566-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/09/2022] [Accepted: 03/22/2023] [Indexed: 04/05/2023] Open
Abstract
As in modern communication networks, the security of quantum networks will rely on complex cryptographic tasks that are based on a handful of fundamental primitives. Weak coin flipping (WCF) is a significant such primitive which allows two mistrustful parties to agree on a random bit while they favor opposite outcomes. Remarkably, perfect information-theoretic security can be achieved in principle for quantum WCF. Here, we overcome conceptual and practical issues that have prevented the experimental demonstration of this primitive to date, and demonstrate how quantum resources can provide cheat sensitivity, whereby each party can detect a cheating opponent, and an honest party is never sanctioned. Such a property is not known to be classically achievable with information-theoretic security. Our experiment implements a refined, loss-tolerant version of a recently proposed theoretical protocol and exploits heralded single photons generated by spontaneous parametric down conversion, a carefully optimized linear optical interferometer including beam splitters with variable reflectivities and a fast optical switch for the verification step. High values of our protocol benchmarks are maintained for attenuation corresponding to several kilometers of telecom optical fiber.
Collapse
Affiliation(s)
- Simon Neves
- Sorbonne Université, CNRS, LIP6, 4 Place Jussieu, Paris, F-75005, France.
| | - Verena Yacoub
- Sorbonne Université, CNRS, LIP6, 4 Place Jussieu, Paris, F-75005, France
| | - Ulysse Chabaud
- Institute for Quantum Information and Matter, California Institute of Technology, 1200 E California Blvd, Pasadena, CA, 91125, USA
- DIENS, École Normale Supérieure, PSL University, CNRS, INRIA, 45 rue d'Ulm, Paris, 75005, France
| | - Mathieu Bozzio
- University of Vienna, Faculty of Physics, Vienna Center for Quantum Science and Technology (VCQ), 1090, Vienna, Austria.
| | - Iordanis Kerenidis
- Université de Paris, CNRS, IRIF, 8 Place Aurélie Nemours, Paris, 75013, France
| | - Eleni Diamanti
- Sorbonne Université, CNRS, LIP6, 4 Place Jussieu, Paris, F-75005, France
| |
Collapse
|
2
|
Guo X, Li P, Zhong J, Wen D, Wei B, Liu S, Qi S, Zhao J. Stokes meta-hologram toward optical cryptography. Nat Commun 2022; 13:6687. [PMID: 36335215 PMCID: PMC9637117 DOI: 10.1038/s41467-022-34542-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/30/2022] [Accepted: 10/28/2022] [Indexed: 11/07/2022] Open
Abstract
Optical cryptography manifests itself a powerful platform for information security, which involves encrypting secret images into visual patterns. Recently, encryption schemes demonstrated on metasurface platform have revolutionized optical cryptography, as the versatile design concept allows for unrestrained creativity. Despite rapid progresses, most efforts focus on the functionalities of cryptography rather than addressing performance issues, such as deep security, information capacity, and reconstruction quality. Here, we develop an optical encryption scheme by integrating visual cryptography with metasurface-assisted pattern masking, referred to as Stokes meta-hologram. Based on spatially structured polarization pattern masking, Stokes meta-hologram allows multichannel vectorial encryption to mask multiple secret images into unrecognizable visual patterns, and retrieve them following Stokes vector analysis. Further, an asymmetric encryption scheme based on Stokes vector rotation transformation is proposed to settle the inherent problem of the need to share the key in symmetric encryption. Our results show that Stokes meta-hologram can achieve optical cryptography with effectively improved security, and thereby paves a promising pathway toward optical and quantum security, optical communications, and anticounterfeiting. Achieving optical cryptography scheme with both high capacity and security is highly desirable. Here, authors report a Stokes meta-hologram with a hierarchical encryption strategy that allows vector encryptions to produce depth-masked ciphertexts.
Collapse
Affiliation(s)
- Xuyue Guo
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China
| | - Peng Li
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China.
| | - Jinzhan Zhong
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China
| | - Dandan Wen
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China
| | - Bingyan Wei
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China
| | - Sheng Liu
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China
| | - Shuxia Qi
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China
| | - Jianlin Zhao
- Key Laboratory of light field manipulation and information acquisition, Ministry of Industry and Information Technology, and Shaanxi Key Laboratory of Optical Information Technology, School of Physical Science and Technology, Northwestern Polytechnical University, Xi'an, 710129, China.
| |
Collapse
|
3
|
Santos MB, Mateus P, Pinto AN. Quantum Oblivious Transfer: A Short Review. ENTROPY 2022; 24:e24070945. [PMID: 35885167 PMCID: PMC9320716 DOI: 10.3390/e24070945] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/08/2022] [Revised: 07/02/2022] [Accepted: 07/04/2022] [Indexed: 02/05/2023]
Abstract
Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations. Although much of the work in this field covers quantum key distribution (QKD), there have been some crucial steps towards the understanding and development of quantum oblivious transfer (QOT). One can show the similarity between the application structure of both QKD and QOT primitives. Just as QKD protocols allow quantum-safe communication, QOT protocols allow quantum-safe computation. However, the conditions under which QOT is fully quantum-safe have been subject to intense scrutiny and study. In this review article, we survey the work developed around the concept of oblivious transfer within theoretical quantum cryptography. We focus on some proposed protocols and their security requirements. We review the impossibility results that daunt this primitive and discuss several quantum security models under which it is possible to prove QOT security.
Collapse
Affiliation(s)
- Manuel B. Santos
- Instituto de Telecomunicaçoes, 1049-001 Lisboa, Portugal;
- Departamento de Matemática, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa, Portugal
- Correspondence:
| | - Paulo Mateus
- Instituto de Telecomunicaçoes, 1049-001 Lisboa, Portugal;
- Departamento de Matemática, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa, Portugal
| | - Armando N. Pinto
- Instituto de Telecomunicaçoes, 3810-193 Aveiro, Portugal;
- Departamento de Eletrónica, Telecomunicaçoes e Informática, Universidade de Aveiro, 3810-193 Aveiro, Portugal
| |
Collapse
|
4
|
Pitalúa-García D. Unconditionally secure relativistic multi-party biased coin flipping and die rolling. Proc Math Phys Eng Sci 2022; 477:20210203. [PMID: 35153573 PMCID: PMC8385382 DOI: 10.1098/rspa.2021.0203] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/06/2021] [Accepted: 07/22/2021] [Indexed: 11/30/2022] Open
Abstract
We introduce relativistic multi-party biased die-rolling protocols, generalizing coin flipping to M≥2 parties and to N≥2 outcomes for any chosen outcome biases and show them unconditionally secure. Our results prove that the most general random secure multi-party computation, where all parties receive the output and there is no secret input by any party, can be implemented with unconditional security. Our protocols extend Kent’s (Kent A. 1999 Phys. Rev. Lett.83, 5382) two-party unbiased coin-flipping protocol, do not require any quantum communication, are practical to implement with current technology and to our knowledge are the first multi-party relativistic cryptographic protocols.
Collapse
Affiliation(s)
- Damián Pitalúa-García
- Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge CB3 0WA, UK
| |
Collapse
|
5
|
Costa B, Branco P, Goulão M, Lemus M, Mateus P. Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting. ENTROPY (BASEL, SWITZERLAND) 2021; 23:1001. [PMID: 34441141 PMCID: PMC8394280 DOI: 10.3390/e23081001] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/14/2021] [Revised: 07/22/2021] [Accepted: 07/22/2021] [Indexed: 11/16/2022]
Abstract
Secure computation is a powerful cryptographic tool that encompasses the evaluation of any multivariate function with arbitrary inputs from mutually distrusting parties. The oblivious transfer primitive serves is a basic building block for the general task of secure multi-party computation. Therefore, analyzing the security in the universal composability framework becomes mandatory when dealing with multi-party computation protocols composed of oblivious transfer subroutines. Furthermore, since the required number of oblivious transfer instances scales with the size of the circuits, oblivious transfer remains as a bottleneck for large-scale multi-party computation implementations. Techniques that allow one to extend a small number of oblivious transfers into a larger one in an efficient way make use of the oblivious transfer variant called randomized oblivious transfer. In this work, we present randomized versions of two known oblivious transfer protocols, one quantum and another post-quantum with ring learning with an error assumption. We then prove their security in the quantum universal composability framework, in a common reference string model.
Collapse
Affiliation(s)
- Bruno Costa
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Capgemini Engineering, Av. D. João II, Lote 1.07.2.1, Piso 2, 1990-096 Lisbon, Portugal
| | - Pedro Branco
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Instituto de Telecomunicações, IST Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - Manuel Goulão
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Instituto de Telecomunicações, IST Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| | - Mariano Lemus
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
| | - Paulo Mateus
- Departamento de Matemática, Instituto Superior Técnico, Av. Rovisco Pais, 1049-001 Lisbon, Portugal; (B.C.); (P.B.); (M.G.); (M.L.)
- Instituto de Telecomunicações, IST Av. Rovisco Pais, 1049-001 Lisbon, Portugal
| |
Collapse
|
6
|
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation. APPLIED SCIENCES-BASEL 2020. [DOI: 10.3390/app10124080] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We present a method to generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach of quantum and classical, we obtain a practical and high-speed oblivious transfer protocol. We analyse the security and efficiency features of the technique and conclude that it presents advantages in both areas when compared to public-key based techniques.
Collapse
|
7
|
Practical quantum random‐number generation based on sampling vacuum fluctuations. ACTA ACUST UNITED AC 2019. [DOI: 10.1002/que2.8] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/19/2023]
|
8
|
Abstract
One-time programs, computer programs which self-destruct after being run only once, are a powerful building block in cryptography and would allow for new forms of secure software distribution. However, ideal one-time programs have been proved to be unachievable using either classical or quantum resources. Here we relax the definition of one-time programs to allow some probability of error in the output and show that quantum mechanics offers security advantages over purely classical resources. We introduce a scheme for encoding probabilistic one-time programs as quantum states with prescribed measurement settings, explore their security, and experimentally demonstrate various one-time programs using measurements on single-photon states. These include classical logic gates, a program to solve Yao's millionaires problem, and a one-time delegation of a digital signature. By combining quantum and classical technology, we demonstrate that quantum techniques can enhance computing capabilities even before full-scale quantum computers are available.
Collapse
|
9
|
Continuous-variable protocol for oblivious transfer in the noisy-storage model. Nat Commun 2018; 9:1450. [PMID: 29654262 PMCID: PMC5899178 DOI: 10.1038/s41467-018-03729-4] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/12/2017] [Accepted: 03/07/2018] [Indexed: 11/21/2022] Open
Abstract
Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here a quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows us to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate in a proof-of-principle experiment the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems. Oblivious transfer is a standard primitive for cryptography between two parties which do not trust each other. Here, the authors propose a continuous-variable protocol which is secure against a dishonest party with bounded quantum storage capacity, and realize a proof-of-principle implementation.
Collapse
|
10
|
Ito T, Koizumi H, Suzuki N, Kakesu I, Iwakawa K, Uchida A, Koshiba T, Muramatsu J, Yoshimura K, Inubushi M, Davis P. Physical implementation of oblivious transfer using optical correlated randomness. Sci Rep 2017; 7:8444. [PMID: 28814719 PMCID: PMC5559580 DOI: 10.1038/s41598-017-08229-x] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/06/2017] [Accepted: 07/10/2017] [Indexed: 11/24/2022] Open
Abstract
We demonstrate physical implementation of information-theoretic secure oblivious transfer based on bounded observability using optical correlated randomness in semiconductor lasers driven by common random light broadcast over optical fibers. We demonstrate that the scheme can achieve one-out-of-two oblivious transfer with effective key generation rate of 110 kb/s. The results show that this scheme is a promising approach to achieve information-theoretic secure oblivious transfer over long distances for future applications of secure computation such as privacy-preserving database mining, auctions and electronic-voting.
Collapse
Affiliation(s)
- Tomohiro Ito
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan
| | - Hayato Koizumi
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan
| | - Nobumitsu Suzuki
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan
| | - Izumi Kakesu
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan
| | - Kento Iwakawa
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan
| | - Atsushi Uchida
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan.
| | - Takeshi Koshiba
- Department of Information and Computer Sciences, Saitama University, 255 Shimo-okubo,Sakura-ku, Saitama City, Saitama, 338-8570, Japan
| | - Jun Muramatsu
- NTT Communication Science Laboratories, NTT Corporation, 3-1 Morinosato, Wakamiya, Atsugi-Shi, Kanagawa, 243-0198, Japan
| | - Kazuyuki Yoshimura
- Department of Information and Electronics, Graduate school of Engineering, Tottori University 4-101 Koyama-Minami, Tottori, 680-8552, Japan
| | - Masanobu Inubushi
- NTT Communication Science Laboratories, NTT Corporation, 3-1 Morinosato, Wakamiya, Atsugi-Shi, Kanagawa, 243-0198, Japan
| | - Peter Davis
- Telecognix Corporation, Japan, 58-13 Shimooji-cho, Yoshida, Sakyo-ku, Kyoto, 606-8314, Japan
| |
Collapse
|
11
|
Broadbent A, Schaffner C. Quantum cryptography beyond quantum key distribution. DESIGNS, CODES, AND CRYPTOGRAPHY 2015; 78:351-382. [PMID: 32226229 PMCID: PMC7089691 DOI: 10.1007/s10623-015-0157-4] [Citation(s) in RCA: 17] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 10/21/2015] [Indexed: 06/01/2023]
Abstract
Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline is quantum key distribution (QKD), there exist many other applications such as quantum money, randomness generation, secure two- and multi-party computation and delegated quantum computation. Quantum cryptography also studies the limitations and challenges resulting from quantum adversaries-including the impossibility of quantum bit commitment, the difficulty of quantum rewinding and the definition of quantum security models for classical primitives. In this review article, aimed primarily at cryptographers unfamiliar with the quantum world, we survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.
Collapse
Affiliation(s)
- Anne Broadbent
- Department of Mathematics and Statistics, University of Ottawa, Ottawa, Canada
| | - Christian Schaffner
- Institute for Logic, Language and Computation (ILLC), University of Amsterdam, and Centrum Wiskunde & Informatica (CWI), Amsterdam, The Netherlands
| |
Collapse
|
12
|
Chan P, Lucio-Martinez I, Mo X, Simon C, Tittel W. Performing private database queries in a real-world environment using a quantum protocol. Sci Rep 2014; 4:5233. [PMID: 24913129 PMCID: PMC5381472 DOI: 10.1038/srep05233] [Citation(s) in RCA: 40] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/09/2014] [Accepted: 05/19/2014] [Indexed: 11/29/2022] Open
Abstract
In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.
Collapse
Affiliation(s)
- Philip Chan
- Institute for Quantum Science and Technology, and Department of Electrical & Computer Engineering, University of Calgary, 2500 University Drive NW, Calgary, Alberta T2N 1N4, Canada
| | - Itzel Lucio-Martinez
- Institute for Quantum Science and Technology, and Department of Physics & Astronomy, University of Calgary, 2500 University Drive NW, Calgary, Alberta T2N 1N4, Canada
| | - Xiaofan Mo
- 1] Institute for Quantum Science and Technology, and Department of Physics & Astronomy, University of Calgary, 2500 University Drive NW, Calgary, Alberta T2N 1N4, Canada [2]
| | - Christoph Simon
- Institute for Quantum Science and Technology, and Department of Physics & Astronomy, University of Calgary, 2500 University Drive NW, Calgary, Alberta T2N 1N4, Canada
| | - Wolfgang Tittel
- Institute for Quantum Science and Technology, and Department of Physics & Astronomy, University of Calgary, 2500 University Drive NW, Calgary, Alberta T2N 1N4, Canada
| |
Collapse
|
13
|
Pappa A, Jouguet P, Lawson T, Chailloux A, Legré M, Trinkler P, Kerenidis I, Diamanti E. Experimental plug and play quantum coin flipping. Nat Commun 2014; 5:3717. [DOI: 10.1038/ncomms4717] [Citation(s) in RCA: 30] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/05/2013] [Accepted: 03/24/2014] [Indexed: 11/09/2022] Open
|