Device-independent two-party cryptography secure against sequential attacks

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningfagfællebedømt

Standard

Device-independent two-party cryptography secure against sequential attacks. / Kaniewski, Jedrzej; Wehner, Stephanie.

I: New Journal of Physics, Bind 18, Nr. 5, 055004, 06.05.2016.

Publikation: Bidrag til tidsskriftTidsskriftartikelForskningfagfællebedømt

Harvard

Kaniewski, J & Wehner, S 2016, 'Device-independent two-party cryptography secure against sequential attacks', New Journal of Physics, bind 18, nr. 5, 055004. https://doi.org/10.1088/1367-2630/18/5/055004

APA

Kaniewski, J., & Wehner, S. (2016). Device-independent two-party cryptography secure against sequential attacks. New Journal of Physics, 18(5), [055004]. https://doi.org/10.1088/1367-2630/18/5/055004

Vancouver

Kaniewski J, Wehner S. Device-independent two-party cryptography secure against sequential attacks. New Journal of Physics. 2016 maj 6;18(5). 055004. https://doi.org/10.1088/1367-2630/18/5/055004

Author

Kaniewski, Jedrzej ; Wehner, Stephanie. / Device-independent two-party cryptography secure against sequential attacks. I: New Journal of Physics. 2016 ; Bind 18, Nr. 5.

Bibtex

@article{b1016464bc4a4fe4b310efccbe785879,
title = "Device-independent two-party cryptography secure against sequential attacks",
abstract = "The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice's setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.",
author = "Jedrzej Kaniewski and Stephanie Wehner",
year = "2016",
month = may,
day = "6",
doi = "10.1088/1367-2630/18/5/055004",
language = "English",
volume = "18",
journal = "New Journal of Physics",
issn = "1367-2630",
publisher = "IOP Publishing",
number = "5",

}

RIS

TY - JOUR

T1 - Device-independent two-party cryptography secure against sequential attacks

AU - Kaniewski, Jedrzej

AU - Wehner, Stephanie

PY - 2016/5/6

Y1 - 2016/5/6

N2 - The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice's setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

AB - The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice's setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

U2 - 10.1088/1367-2630/18/5/055004

DO - 10.1088/1367-2630/18/5/055004

M3 - Journal article

VL - 18

JO - New Journal of Physics

JF - New Journal of Physics

SN - 1367-2630

IS - 5

M1 - 055004

ER -

ID: 161165998