Information-theoretically secure data origin authentication with quantum
and classical resources
- URL: http://arxiv.org/abs/2011.06849v1
- Date: Fri, 13 Nov 2020 10:33:29 GMT
- Title: Information-theoretically secure data origin authentication with quantum
and classical resources
- Authors: Georgios M. Nikolopoulos and Marc Fischlin
- Abstract summary: In conventional cryptography, information-theoretically secure message authentication can be achieved by means of universal hash functions.
We present an interactive entanglement-assisted scheme, which ideally allows for the authentication of classical messages with a classical key.
- Score: 2.233624388203003
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In conventional cryptography, information-theoretically secure message
authentication can be achieved by means of universal hash functions, and
requires that the two legitimate users share a random secret key, which is
twice as long as the message. We address the question as of whether quantum
resources can offer any advantage over classical unconditionally secure message
authentication codes. It is shown that passive prepare-and-measure quantum
message-authentication schemes cannot do better than their classical
counterparts. Subsequently we present an interactive entanglement-assisted
scheme, which ideally allows for the authentication of classical messages with
a classical key, which is as long as the message.
Related papers
- Secure Quantum Relay Networks Using Distributed Entanglement without Classical Authentication [0.0]
Current quantum communication protocols rely heavily on classical authentication for message origin verification.<n>We propose a novel framework for secure quantum relay networks that completely avoids classical authentication.
arXiv Detail & Related papers (2025-07-07T20:25:10Z) - Relating Quantum Tamper-Evident Encryption to Other Cryptographic Notions [0.0]
A quantum tamper-evident encryption scheme is a non-interactive symmetric-key encryption scheme mapping classical messages to quantum ciphertexts.
This quantum cryptographic primitive was first introduced by Gottesman in 2003.
We further our understanding of tamper-evident encryption by formally relating it to other cryptographic primitives in an information-theoretic setting.
arXiv Detail & Related papers (2024-11-05T02:20:29Z) - Quantum Key Leasing for PKE and FHE with a Classical Lessor [19.148581164364387]
We consider the problem of secure key leasing, also known as revocable cryptography.
This problem aims to leverage unclonable nature of quantum information.
We construct a secure key leasing scheme to lease a decryption key of a (classical) public-key, homomorphic encryption scheme.
arXiv Detail & Related papers (2023-10-22T15:25:29Z) - Towards practical quantum position verification [0.0]
We discuss protocols for quantum position verification schemes based on the standard quantum cryptographic assumption that a tagging device can keep classical data secure.
Our schemes use a classical key replenished by quantum key distribution.
The security of classical data makes the schemes secure against non-local spoofing attacks.
arXiv Detail & Related papers (2023-09-18T18:36:16Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Robust Quantum Public-Key Encryption with Applications to Quantum Key
Distribution [16.06159998475861]
Quantum key distribution (QKD) allows Alice and Bob to agree on a shared secret key, while communicating over a public (untrusted) quantum channel.
It has two main advantages: (i) The key is unconditionally hidden to the eyes of any attacker, and (ii) its security assumes only the existence of authenticated classical channels.
We propose a two-message QKD protocol that satisfies everlasting security, assuming only the existence of quantum-secure one-way functions.
arXiv Detail & Related papers (2023-04-06T11:14:55Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - Quantum secure direct communication with private dense coding using
general preshared quantum state [59.99354397281036]
We study secure direct communication by using a general preshared quantum state and a generalization of dense coding.
For a practical application, we propose a concrete protocol and derive an upper bound of information leakage.
arXiv Detail & Related papers (2021-12-30T16:12:07Z) - Quantum Encryption with Certified Deletion, Revisited: Public Key,
Attribute-Based, and Classical Communication [10.973034520723957]
Broadbent and Islam proposed a quantum cryptographic primitive called quantum encryption with certified deletion.
In this primitive, a receiver in possession of a quantum ciphertext can generate a classical certificate that the encrypted message is deleted.
Although deletion certificates are privately verifiable, which means a verification key for a certificate has to be kept secret, in the definition by Broadbent and Islam, we can also consider public verifiability.
arXiv Detail & Related papers (2021-05-12T01:41:46Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.