Dispelling Myths on Superposition Attacks: Formal Security Model and
Attack Analyses
- URL: http://arxiv.org/abs/2007.00677v1
- Date: Wed, 1 Jul 2020 18:00:54 GMT
- Title: Dispelling Myths on Superposition Attacks: Formal Security Model and
Attack Analyses
- Authors: Luka Music, C\'eline Chevalier, Elham Kashefi
- Abstract summary: We propose the first computational security model considering superposition attacks for multiparty protocols.
We show that our new security model is satisfiable by proving the security of the well-known One-Time-Pad protocol.
We use this newly imparted knowledge to construct the first concrete protocol for Secure Two-Party Computation that is resistant to superposition attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: It is of folkloric belief that the security of classical cryptographic
protocols is automatically broken if the Adversary is allowed to perform
superposition queries and the honest players forced to perform actions
coherently on quantum states. Another widely held intuition is that enforcing
measurements on the exchanged messages is enough to protect protocols from
these attacks.
However, the reality is much more complex. Security models dealing with
superposition attacks only consider unconditional security. Conversely,
security models considering computational security assume that all supposedly
classical messages are measured, which forbids by construction the analysis of
superposition attacks. Boneh and Zhandry have started to study the quantum
computational security for classical primitives in their seminal work at
Crypto'13, but only in the single-party setting. To the best of our knowledge,
an equivalent model in the multiparty setting is still missing.
In this work, we propose the first computational security model considering
superposition attacks for multiparty protocols. We show that our new security
model is satisfiable by proving the security of the well-known One-Time-Pad
protocol and give an attack on a variant of the equally reputable Yao Protocol
for Secure Two-Party Computations. The post-mortem of this attack reveals the
precise points of failure, yielding highly counter-intuitive results: Adding
extra classical communication, which is harmless for classical security, can
make the protocol become subject to superposition attacks. We use this newly
imparted knowledge to construct the first concrete protocol for Secure
Two-Party Computation that is resistant to superposition attacks. Our results
show that there is no straightforward answer to provide for either the
vulnerabilities of classical protocols to superposition attacks or the adapted
countermeasures.
Related papers
- A Realistic Threat Model for Large Language Model Jailbreaks [87.64278063236847]
In this work, we propose a unified threat model for the principled comparison of jailbreak attacks.
Our threat model combines constraints in perplexity, measuring how far a jailbreak deviates from natural text.
We adapt popular attacks to this new, realistic threat model, with which we, for the first time, benchmark these attacks on equal footing.
arXiv Detail & Related papers (2024-10-21T17:27:01Z) - Defending Large Language Models against Jailbreak Attacks via Semantic
Smoothing [107.97160023681184]
Aligned large language models (LLMs) are vulnerable to jailbreaking attacks.
We propose SEMANTICSMOOTH, a smoothing-based defense that aggregates predictions of semantically transformed copies of a given input prompt.
arXiv Detail & Related papers (2024-02-25T20:36:03Z) - Can We Trust the Unlabeled Target Data? Towards Backdoor Attack and Defense on Model Adaptation [120.42853706967188]
We explore the potential backdoor attacks on model adaptation launched by well-designed poisoning target data.
We propose a plug-and-play method named MixAdapt, combining it with existing adaptation algorithms.
arXiv Detail & Related papers (2024-01-11T16:42:10Z) - Security of differential phase shift QKD from relativistic principles [1.114274092885218]
This work presents the first full security proof of DPS QKD against general attacks.
The proof combines techniques from quantum information theory, quantum optics, and relativity.
Our results shed light on the range of applicability of state-of-the-art security proof techniques.
arXiv Detail & Related papers (2023-01-26T19:00:00Z) - Security of quantum key distribution from generalised entropy
accumulation [2.1030878979833467]
We provide a formal framework for general quantum key distribution protocols.
We show that security against general attacks reduces to security against collective attacks.
Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation.
arXiv Detail & Related papers (2022-03-09T19:00:07Z) - A generalized efficiency mismatch attack to bypass detection-scrambling
countermeasure [0.0]
We show that the proposed countermeasure can be bypassed if the attack is generalized by including more attack variables.
Our result and methodology could be used to security-certify a free-space quantum communication receiver against all types of detector-efficiency-mismatch type attacks.
arXiv Detail & Related papers (2021-01-07T05:02:24Z) - Security Proof Against Collective Attacks for an Experimentally Feasible
Semiquantum Key Distribution Protocol [1.5469452301122175]
Semiquantum key distribution (SQKD) allows two parties to create a shared secret key, even if one of these parties is classical.
Most SQKD protocols suffer from severe practical security problems when implemented using photons.
"Mirror protocol" is an experimentally feasible SQKD protocol overcoming those drawbacks.
arXiv Detail & Related papers (2020-12-03T18:05:36Z) - Backdoor Attack against Speaker Verification [86.43395230456339]
We show that it is possible to inject the hidden backdoor for infecting speaker verification models by poisoning the training data.
We also demonstrate that existing backdoor attacks cannot be directly adopted in attacking speaker verification.
arXiv Detail & Related papers (2020-10-22T11:10:08Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Label-Only Membership Inference Attacks [67.46072950620247]
We introduce label-only membership inference attacks.
Our attacks evaluate the robustness of a model's predicted labels under perturbations.
We find that training models with differential privacy and (strong) L2 regularization are the only known defense strategies.
arXiv Detail & Related papers (2020-07-28T15:44:31Z) - Asymptotic security analysis of teleportation based quantum cryptography [0.0]
We prove that the teleportation based quantum cryptography protocol presented in [Opt. Commun 283, 184] is secure against all types of individual and collective attacks.
We then investigate modifications to that protocol leading to greater secret-key rates and to security against coherent attacks.
arXiv Detail & Related papers (2020-02-10T17:54:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.