Quantum Position Verification in the Random Oracle Model

We present a quantum position verification scheme in the random oracle model. In contrast to prior work, our scheme does not require bounded storage/retrieval/entanglement assumptions. We also give an efficient position-based authentication protocol. This enables secret and authenticated communication with an entity that is only identified by its position in space.

[1]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[2]  Mark Zhandry,et al.  Random Oracles in a Quantum World , 2010, ASIACRYPT.

[3]  Rafail Ostrovsky,et al.  Position-Based Quantum Cryptography: Impossibility and Constructions , 2011, IACR Cryptol. ePrint Arch..

[4]  Marco Tomamichel,et al.  Secure Bit Commitment From Relativistic Constraints , 2012, IEEE Transactions on Information Theory.

[5]  Gilles Brassard,et al.  Tight bounds on quantum searching , 1996, quant-ph/9605034.

[6]  Juliane Freud Protecting Information From Classical Error Correction To Quantum Cryptography , 2016 .

[7]  Raymond Laflamme,et al.  An Introduction to Quantum Computing , 2007, Quantum Inf. Comput..

[8]  V. Rich Personal communication , 1989, Nature.

[9]  Dominique Unruh,et al.  Revocable Quantum Timed-Release Encryption , 2014, J. ACM.

[10]  Roberto Bagnara,et al.  The Parma Polyhedra Library: Toward a complete set of numerical abstractions for the analysis and verification of hardware and software systems , 2006, Sci. Comput. Program..

[11]  Adrian Kent,et al.  Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes , 2011, Physical review letters.

[12]  Adrian Kent,et al.  Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints , 2010, ArXiv.

[13]  S. Wehner,et al.  A monogamy-of-entanglement game with applications to device-independent quantum cryptography , 2012, 1210.4359.

[14]  Mark Zhandry,et al.  Secure Identity-Based Encryption in the Quantum Random Oracle Model , 2012, CRYPTO.

[15]  Rafail Ostrovsky,et al.  Position-Based Cryptography , 2014, SIAM J. Comput..

[16]  Serge Fehr,et al.  One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games , 2013, EUROCRYPT.

[17]  Salman Beigi,et al.  Simplified instantaneous non-local quantum computation with applications to position-based cryptography , 2011, 1101.1065.