Quantum Non-malleability and Authentication

In encryption, non-malleability is a highly desirable property: it ensures that adversaries cannot manipulate the plaintext by acting on the ciphertext. Ambainis, Bouda and Winter gave a definition of non-malleability for the encryption of quantum data. In this work, we show that this definition is too weak, as it allows adversaries to "inject" plaintexts of their choice into the ciphertext. We give a new definition of quantum non-malleability which resolves this problem. Our definition is expressed in terms of entropic quantities, considers stronger adversaries, and does not assume secrecy. Rather, we prove that quantum non-malleability implies secrecy; this is in stark contrast to the classical setting, where the two properties are completely independent. For unitary schemes, our notion of non-malleability is equivalent to encryption with a two-design (and hence also to the definition of Ambainis et al.). Our techniques also yield new results regarding the closely-related task of quantum authentication. We show that "total authentication" (a notion recently proposed by Garg, Yuen and Zhandry) can be satisfied with two-designs, a significant improvement over the eight-design construction of Garg et al. We also show that, under a mild adaptation of the rejection procedure, both total authentication and our notion of non-malleability yield quantum authentication as defined by Dupuis, Nielsen and Salvail.

[1]  A. Lichnerowicz Proof of the Strong Subadditivity of Quantum-Mechanical Entropy , 2018 .

[2]  R. Werner,et al.  Counterexample to an additivity conjecture for output purity of quantum channels , 2002, quant-ph/0203003.

[3]  R. Schumann Quantum Information Theory , 2000, quant-ph/0010060.

[4]  E. Lieb,et al.  Proof of the strong subadditivity of quantum‐mechanical entropy , 1973 .

[5]  Dominique Unruh,et al.  Simulatable security for quantum protocols. (arXiv:quant-ph/0409125v2 CROSS LISTED) , 2004, quant-ph/0409125.

[6]  Li Liu,et al.  Near-linear constructions of exact unitary 2-designs , 2015, Quantum Inf. Comput..

[7]  Christopher Portmann,et al.  Quantum Authentication with Key Recycling , 2016, EUROCRYPT.

[8]  Mark Zhandry,et al.  New Security Notions and Feasibility Results for Authentication of Quantum Data , 2016, CRYPTO.

[9]  A. Jamiołkowski Linear transformations which preserve trace and positive semidefiniteness of operators , 1972 .

[10]  Richard Andrew Low,et al.  Pseudo-randonmess and Learning in Quantum Computation , 2010, 1006.5227.

[11]  Anne Broadbent,et al.  Efficient Simulation for Quantum Message Authentication , 2016, ICITS.

[12]  J. Kowski Linear transformations which preserve trace and positive semidefiniteness of operators , 1972 .

[13]  Debbie W. Leung,et al.  The Universal Composable Security of Quantum Message Authentication with Key Recyling , 2016, 1610.09434.

[14]  Andris Ambainis,et al.  Private quantum channels , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[15]  Amiel Feinstein,et al.  Information and information stability of random variables and processes , 1964 .

[16]  Man-Duen Choi Completely positive linear maps on complex matrices , 1975 .

[17]  Mario Berta,et al.  Catalytic Decoupling of Quantum Information. , 2016, Physical review letters.

[18]  Elham Kashefi,et al.  Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[19]  Keisuke Tanaka,et al.  Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity , 2011, ICITS.

[20]  Elliott H. Lieb,et al.  A Fundamental Property of Quantum-Mechanical Entropy , 1973 .

[21]  Ueli Maurer,et al.  Abstract Cryptography , 2011, ICS.

[22]  M. Fannes A continuity property of the entropy density for spin lattice systems , 1973 .

[23]  Louis Salvail,et al.  Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries , 2010, CRYPTO.

[24]  Stacey Jeffery,et al.  Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity , 2014, CRYPTO.

[25]  E. Lieb,et al.  A Fundamental Property of Quantum-Mechanical Entropy , 1973 .

[26]  R. Renner,et al.  One-Shot Decoupling , 2010, 1012.6044.

[27]  Christoph Dankert,et al.  Exact and approximate unitary 2-designs and their application to fidelity estimation , 2009 .

[28]  R. Renner,et al.  The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory , 2009, 0912.3805.

[29]  W. Stinespring Positive functions on *-algebras , 1955 .

[30]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[31]  Christian Schaffner,et al.  Quantum Homomorphic Encryption for Polynomial-Sized Circuits , 2016, CRYPTO.

[32]  Mario Berta,et al.  Deconstruction and conditional erasure of quantum correlations , 2016, Physical Review A.

[33]  Andris Ambainis,et al.  Nonmalleable encryption of quantum information , 2008, 0808.0353.

[34]  Mark M. Wilde,et al.  Quantum Information Theory , 2013 .

[35]  Elad Eban,et al.  Interactive Proofs For Quantum Computations , 2017, 1704.04487.

[36]  F. Brandão,et al.  Local random quantum circuits are approximate polynomial-designs: numerical results , 2012, 1208.0692.

[37]  M. Fannes,et al.  Continuity of quantum conditional information , 2003, quant-ph/0312081.

[38]  Louis Salvail,et al.  Actively Secure Two-Party Evaluation of Any Quantum Operation , 2012, CRYPTO.

[39]  Scott Aaronson,et al.  Improved Simulation of Stabilizer Circuits , 2004, ArXiv.

[40]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[41]  Tommaso Gagliardoni,et al.  Computational Security of Quantum Encryption , 2016, ICITS.

[42]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[43]  K. Audenaert A sharp continuity estimate for the von Neumann entropy , 2006, quant-ph/0610146.