Insider-Proof Encryption with Applications for Quantum Key Distribution

We introduce insider-proof private channels which are private channels that additionally allow for security even when the key is correlated with the message. This prevents an insider, who has access to secret keys and the capability of choosing messages to be sent on the channel, from signalling to someone who can read the ciphertexts. We give a construction for approximately insider-proof private channels using 2-universal hash functions.

[1]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[2]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[3]  Roger Colbeck,et al.  Prisoners of their own device: Trojan attacks on device-independent quantum cryptography , 2012 .

[4]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[5]  Adrian Kent,et al.  Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.

[6]  Umesh V. Vazirani,et al.  A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games , 2012, ITCS '13.

[7]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[8]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[9]  W. Wootters,et al.  Distributed Entanglement , 1999, quant-ph/9907047.

[10]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[11]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[12]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[13]  Adam D. Smith,et al.  Leftover Hashing Against Quantum Side Information , 2011, IEEE Transactions on Information Theory.

[14]  Adrian Kent,et al.  Unconditionally secure device-independent quantum key distribution with only two devices , 2012, ArXiv.

[15]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[16]  Umesh Vazirani,et al.  Classical command of quantum systems via rigidity of CHSH games , 2012, 1209.0449.

[17]  Renato Renner,et al.  Efficient Device-Independent Quantum Key Distribution , 2010, EUROCRYPT.

[18]  Renato Renner,et al.  Device-Independent Quantum Key Distribution with Commuting Measurements , 2010, ArXiv.

[19]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.