Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation

We revisit the notion of deniability in quantum key exchange (QKE), a topic that remains largely unexplored. In the only work on this subject by Donald Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for quantum authenticated key exchange, developed by Mosca et al., and extend it to introduce the notion of coercer-deniable QKE, formalized in terms of the indistinguishability of real and fake coercer views. Next, we apply results from a recent work by Arrazola and Scarani on covert quantum communication to establish a connection between covert QKE and deniability. We propose DC-QKE, a simple deniable covert QKE protocol, and prove its deniability via a reduction to the security of covert QKE. Finally, we consider how entanglement distillation can be used to enable information-theoretically deniable protocols for QKE and tasks beyond key exchange.

[1]  Rafael Pass,et al.  On Deniability in the Common Reference String and Random Oracle Model , 2003, CRYPTO.

[2]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[3]  Charles H. Bennett,et al.  Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.

[4]  Charles H. Bennett,et al.  Concentrating partial entanglement by local operations. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[5]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[6]  A. Winter,et al.  Monogamy of quantum entanglement and other correlations , 2003, quant-ph/0310037.

[7]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[8]  Michele Mosca,et al.  A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys , 2011, PQCrypto.

[9]  Shor,et al.  Good quantum error-correcting codes exist. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[10]  Rafail Ostrovsky,et al.  Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..

[11]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.

[12]  Daniel Gottesman Uncloneable encryption , 2003, Quantum Inf. Comput..

[13]  Rosario Gennaro,et al.  New approaches for deniable authentication , 2005, CCS.

[14]  Moni Naor,et al.  Concurrent zero-knowledge , 2004, JACM.

[15]  Mark M. Wilde,et al.  Quantum Information Theory , 2013 .

[16]  Charles H. Bennett,et al.  Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[17]  Matthias Christandl,et al.  Quantum Anonymous Transmissions , 2004, ASIACRYPT.

[18]  Donald F. Towsley,et al.  Covert communication over classical-quantum channels , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[19]  Juan Miguel Arrazola,et al.  Covert Quantum Communication. , 2016, Physical review letters.

[20]  A. Steane Multiple-particle interference and quantum error correction , 1996, Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[21]  Cas J. F. Cremers,et al.  One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability , 2011, IACR Cryptol. ePrint Arch..

[22]  M. Wilde Quantum Information Theory: Noisy Quantum Shannon Theory , 2013 .

[23]  Donald Beaver,et al.  On Deniability in Quantum Key Exchange , 2002, EUROCRYPT.

[24]  Jonathan Katz,et al.  Composability and On-Line Deniability of Authentication , 2009, TCC.

[25]  Hugo Krawczyk,et al.  Deniable authentication and key exchange , 2006, CCS '06.

[26]  M. Koashi,et al.  Monogamy of quantum entanglement and other correlations (6 pages) , 2004 .

[27]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[28]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[29]  Douglas Stebila,et al.  Quantum Key Distribution in the Classical Authenticated Key Exchange Framework , 2012, PQCrypto.

[30]  Nilanjana Datta,et al.  Distilling entanglement from arbitrary resources , 2010, 1006.1896.

[31]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[32]  D. Bruß,et al.  Are general quantum correlations monogamous? , 2011, Physical review letters.

[33]  Ian Goldberg,et al.  Deniable Key Exchanges for Secure Messaging , 2015, CCS.

[34]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[35]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.