kth.sePublikationer
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
On the Impossibility of Key Agreements from Quantum Random Oracles
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Teoretisk datalogi, TCS.ORCID-id: 0000-0001-8217-0158
Carnegie Mellon Univ, Pittsburgh, PA USA..
Acad Sinica, Taipei, Taiwan..
Acad Sinica, Taipei, Taiwan..
Visa övriga samt affilieringar
2022 (Engelska)Ingår i: Advances In Cryptology - CRYPTO 2022, PT II / [ed] Dodis, Y Shrimpton, T, Springer Nature , 2022, Vol. 13508, s. 165-194Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

We study the following question, first publicly posed by Hosoyamada and Yamakawa in 2018. Can parties A, B with quantum computing power and classical communication rely only on a random oracle (that can be queried in quantum superposition) to agree on a key that is private from eavesdroppers? We make the first progress on the question above and prove the following. - When only one of the parties A is classical and the other party B is quantum powered, as long as they ask a total of d oracle queries and agree on a key with probability 1, then there is always a way to break the key agreement by asking O(d(2)) number of classical oracle queries. - When both parties can make quantum queries to the random oracle, we introduce a natural conjecture, which if true would imply attacks with poly(d) classical queries to the random oracle. Our conjecture, roughly speaking, states that the multiplication of any two degree-d real-valued polynomials over the Boolean hypercube of influence at most delta = 1/poly (d) is nonzero. We then prove our conjecture for exponentially small influences, which leads to an (unconditional) classical 2(O(md))-query attack on any such key agreement protocol, where m is the oracle's output length. - Since our attacks are classical, we then ask whether it is always possible to find classical attacks on key agreements with imperfect completeness in the quantum random oracle model. We prove a barrier for this approach, by showing that if the folklore "Simulation Conjecture" (first formally stated by Aaronson and Ambainis in 2009) about the possibility of simulating efficient-query quantum algorithms using efficient-query classical algorithms is false, then there is in fact such a secure key agreement in the quantum random oracle model that cannot be broken classically.

Ort, förlag, år, upplaga, sidor
Springer Nature , 2022. Vol. 13508, s. 165-194
Serie
Lecture Notes in Computer Science, ISSN 0302-9743 ; 13508
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
URN: urn:nbn:se:kth:diva-322323DOI: 10.1007/978-3-031-15979-4_6ISI: 000886792700006Scopus ID: 2-s2.0-85141677504OAI: oai:DiVA.org:kth-322323DiVA, id: diva2:1718092
Konferens
42nd Annual International Cryptology Conference (CRYPTO), AUG 15-18, 2022, Univ Calif, Santa Barbara, CA
Anmärkning

QC 20221212

Part of proceedings: ISBN 978-3-031-15978-7; 978-3-031-15979-4

Tillgänglig från: 2022-12-12 Skapad: 2022-12-12 Senast uppdaterad: 2022-12-12Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltextScopus

Person

Austrin, Per

Sök vidare i DiVA

Av författaren/redaktören
Austrin, Per
Av organisationen
Teoretisk datalogi, TCS
Datavetenskap (datalogi)

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 61 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf