Comparison of Quantum PUF models
- URL: http://arxiv.org/abs/2208.10599v2
- Date: Tue, 1 Nov 2022 19:36:04 GMT
- Title: Comparison of Quantum PUF models
- Authors: Vladlen Galetsky, Soham Ghosh, Christian Deppe and Roberto Ferrara
- Abstract summary: Physical unclonable functions (PUFs) are hardware structures in a physical system (e.g. semiconductor, crystals etc.) that are used to enable unique identification of the semiconductor or to secure keys for cryptographic processes.
We introduce the requirements for QTOKSim, a quantum token based authentication simulator testing its performance on a multi-factor authentication protocol.
- Score: 9.650153007075703
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Physical unclonable functions (PUFs) are hardware structures in a physical
system (e.g. semiconductor, crystals etc.) that are used to enable unique
identification of the semiconductor or to secure keys for cryptographic
processes. A PUF thus generates a noisy secret reproducible at runtime. This
secret can either be used to authenticate the chip, or it is available as a
cryptographic key after removing the noise. Latest advancements in the field of
quantum hardware, in some cases claiming to achieve quantum supremacy, highly
target the fragility of current RSA type classical cryptosystems. As a
solution, one would like to develop Quantum PUFs to mitigate such problem.
There are several approaches for this technology. In our work we compare these
different approaches and introduce the requirements for QTOKSim, a quantum
token based authentication simulator testing its performance on a multi-factor
authentication protocol.
Related papers
- Existential Unforgeability in Quantum Authentication From Quantum Physical Unclonable Functions Based on Random von Neumann Measurement [45.386403865847235]
Physical Unclonable Functions (PUFs) leverage inherent, non-clonable physical randomness to generate unique input-output pairs.
Quantum PUFs (QPUFs) extend this concept by using quantum states as input-output pairs.
We show that no random unitary QPUF can achieve existential unforgeability against Quantum Polynomial Time adversaries.
We introduce a second model where the QPUF functions as a nonunitary quantum channel, which also guarantees existential unforgeability.
arXiv Detail & Related papers (2024-04-17T12:16:41Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Trustworthy Quantum Computation through Quantum Physical Unclonable
Functions [1.539760782452093]
Cloud-based quantum computers (QCs) are readily available for remote access and programming.
This work shows the viability of using intrinsic quantum hardware properties for fingerprinting cloud-based QCs.
We detail a quantum physically unclonable function (Q-PUF) scheme for secure key generation using unique fingerprint data combined with fuzzy extraction.
arXiv Detail & Related papers (2023-11-13T05:47:33Z) - Hybrid quantum transfer learning for crack image classification on NISQ
hardware [62.997667081978825]
We present an application of quantum transfer learning for detecting cracks in gray value images.
We compare the performance and training time of PennyLane's standard qubits with IBM's qasm_simulator and real backends.
arXiv Detail & Related papers (2023-07-31T14:45:29Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Delegated variational quantum algorithms based on quantum homomorphic
encryption [69.50567607858659]
Variational quantum algorithms (VQAs) are one of the most promising candidates for achieving quantum advantages on quantum devices.
The private data of clients may be leaked to quantum servers in such a quantum cloud model.
A novel quantum homomorphic encryption (QHE) scheme is constructed for quantum servers to calculate encrypted data.
arXiv Detail & Related papers (2023-01-25T07:00:13Z) - Simulation of Networked Quantum Computing on Encrypted Data [0.0]
cryptographic techniques must be developed for secure remote use of quantum computing power.
I present a simulation of such a protocol, tested classically on the simulation platform LIQ$Ui|rangle.
arXiv Detail & Related papers (2022-12-25T20:02:53Z) - Learning Classical Readout Quantum PUFs based on single-qubit gates [9.669942356088377]
We formalize the class of Classical Readout Quantum PUFs (CR-QPUFs) using the statistical query (SQ) model.
We show insufficient security for CR-QPUFs based on singlebit rotation gates, when adversary has SQ access to the CR-QPUF.
We demonstrate how a malicious party can learn CR-QPUF characteristics and forge the signature of a quantum device.
arXiv Detail & Related papers (2021-12-13T13:29:22Z) - Quantum Lock: A Provable Quantum Communication Advantage [2.9562795446317964]
This paper proposes a generic design of provably secure PUFs, called hybrid locked PUFs(HLPUFs)
An HLPUF uses a classical PUF, and encodes the output into non-orthogonal quantum states to hide the outcomes of the underlying CPUF from any adversary.
We show that by exploiting non-classical properties of quantum states, the HLPUF allows the server to reuse the challenge-response pairs for further client authentication.
arXiv Detail & Related papers (2021-10-18T17:01:46Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.