Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints

We define the task of quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is unbounded. We define simple security models for this task and briefly discuss alternatives. We illustrate the pitfalls of naive quantum cryptographic reasoning in this context by describing several protocols which at first sight appear unconditionally secure but which, as we show, can in fact be broken by teleportation-based attacks. We also describe some protocols which cannot be broken by these specific attacks, but do not prove they are unconditionally secure. We review the history of quantum tagging protocols, and show that protocols previously proposed by Malaney and Chandran et al. are provably insecure.

[1]  Roger Colbeck,et al.  Quantum And Relativistic Protocols For Secure Multi-Party Computation , 2009, 0911.3814.

[2]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[3]  Stefano Pironio,et al.  Maximally Non-Local and Monogamous Quantum Correlations , 2006, Physical review letters.

[4]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[5]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[6]  Stefano Pironio,et al.  Random numbers certified by Bell’s theorem , 2009, Nature.

[7]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[8]  Adrian Kent,et al.  Private randomness expansion with untrusted devices , 2010, 1011.4474.

[9]  Adrian Kent,et al.  Secure Classical Bit Commitment Using Fixed Capacity Communication Channels , 1999, Journal of Cryptology.

[10]  Lluis Masanes,et al.  Universally-composable privacy amplification from causality constraints , 2008, Physical review letters.

[11]  M. Mckague,et al.  Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices , 2009, 0908.0503.

[12]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[13]  Renato Renner,et al.  Device-Independent Quantum Key Distribution with Commuting Measurements , 2010, ArXiv.

[14]  Adrian Kent,et al.  Unconditionally Secure Bit Commitment , 1998, quant-ph/9810068.

[15]  Andreas J. Winter,et al.  Unconditional security of key distribution from causality constraints , 2006, ArXiv.

[16]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[17]  Esther Hanggi,et al.  Quantum Cryptography Based Solely on Bell's Theorem , 2009 .