Quantum ciphertext authentication and key recycling with the trap code

We investigate quantum authentication schemes constructed from quantum error-correcting codes. We show that if the code has a property called purity testing, then the resulting authentication scheme guarantees the integrity of ciphertexts, not just plaintexts. On top of that, if the code is strong purity testing, the authentication scheme also allows the encryption key to be recycled, partially even if the authentication rejects. Such a strong notion of authentication is useful in a setting where multiple ciphertexts can be present simultaneously, such as in interactive or delegated quantum computation. With these settings in mind, we give an explicit code (based on the trap code) that is strong purity testing but, contrary to other known strong-purity-testing codes, allows for natural computation on ciphertexts.

[1]  Christopher Portmann,et al.  Quantum Authentication with Key Recycling , 2016, EUROCRYPT.

[2]  Christian Schaffner,et al.  Quantum Fully Homomorphic Encryption with Verification , 2017, ASIACRYPT.

[3]  Mark Zhandry,et al.  New Security Notions and Feasibility Results for Authentication of Quantum Data , 2016, CRYPTO.

[4]  Elad Eban,et al.  Interactive Proofs For Quantum Computations , 2017, 1704.04487.

[5]  Peter W. Shor,et al.  Fault-tolerant quantum computation , 1996, Proceedings of 37th Conference on Foundations of Computer Science.

[6]  Christoph Dankert,et al.  Exact and approximate unitary 2-designs and their application to fidelity estimation , 2009 .

[7]  Debbie W. Leung,et al.  The Universal Composable Security of Quantum Message Authentication with Key Recyling , 2016, 1610.09434.

[8]  Gus Gutoski,et al.  Quantum one-time programs , 2013, IACR Cryptol. ePrint Arch..

[9]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[10]  Louis Salvail,et al.  Actively Secure Two-Party Evaluation of Any Quantum Operation , 2012, CRYPTO.

[11]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[12]  Fang Song,et al.  Zero-Knowledge Proof Systems for QMA , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).

[13]  Tommaso Gagliardoni,et al.  Unforgeable Quantum Encryption , 2017, IACR Cryptol. ePrint Arch..

[14]  Lov K. Grover,et al.  Quantum computation , 1999, Proceedings Twelfth International Conference on VLSI Design. (Cat. No.PR00013).

[15]  Anne Broadbent,et al.  Efficient Simulation for Quantum Message Authentication , 2016, ICITS.

[16]  Michal Horodecki,et al.  How to reuse a one-time pad and other notes on authentication encryption and protection of quantum information , 2003, ArXiv.

[17]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[18]  Gorjan Alagic,et al.  Quantum Non-malleability and Authentication , 2016, CRYPTO.

[19]  Serge Fehr,et al.  Quantum Authentication and Encryption with Key Recycling , 2016, IACR Cryptol. ePrint Arch..

[20]  Richard M. Wilson,et al.  On $t$-designs , 1975 .