Zero-knowledge Proof Systems for QMA

PQC Asia Forum Seoul, 2016
What are we talking about
when we talk about
post-quantum cryptography?
Fang Song
Portland State University
PQC Asia Forum Seoul, 2016
A personal view on postquantum cryptography &
a bite on quantum algorithms
Fang Song
Portland State University
How does cryptography
change
in a quantum world?
3
Triumph of modern cryptography
2015 A.M. Turing Award
Public-key
cryptography
Symmetric-key
cryptography
Cryptographic
protocols
• Digital signature: DSA, …
• Public-key encryption: RSA,
…
• Diffie-Hellmann key
• exchange
Block ciphers: AES
• Cryptographic hash function: SHA2, …
• Secure two/multi-party
computation
• e-voting, …
Cryptography: a pillar of security for
individuals, organizations and society!
4
Modern cryptography as a science
A formal framework: provable security
2012 ACM A.M. Turing Award
“… created mathematical structures that turned
cryptography from an art into a science.”
Crypto
scheme Σ
Hard problem Π
 Security Model
 Security Analysis (Proof)
• Breaking Σ is as hard as solving Π
 Computational assumption
• EX. Factoring & Discrete Log hard to solve
5
Into a quantum world: the dark cat rises
Physicists: quantum weirdness Computer scientists
Quantum superposition
1
2
(|ALIVE〉 + |DEAD〉)
Qubit
𝛼 0 + 𝛽|1 〉
Quantum Entanglement
• Non-classical correlation
“Spooky action at a distance”
– A. Einstein
Quantum
gates & circuits
6
How does cryptography
change
in a quantum world?
7
Quantum attacks 1: break classical foundation
✗Broken!
 Computational assumption
Factoring/DL ✗ • Factoring & Discrete Log hard to solve
Public-key crypto
(DSA, RSA,DH,…)
Quantum computer can solve them , fast!
a
a[Shor94]
Need: alternative problems to build crypto on
• Exciting progress: lattice-based, code-based, …
Question: are the new problems hard
for classical & quantum computers?
Is this all we need to
worry about?
8
Quantum attacks 2: invalidate classical framework
Crypto
schemes
Lattices, …
?
✗
 Security Model
 Security Analysis
 Computational assumption:
hard for quantum computer
Alert: unique quantum attacks
This can happen now!
∃ information-theoretically secure protocol
(Technology available)
Brokenb by quantum entanglement! (vs. shared
b[CSST11]
randomness)
Need: quantum provable-security framework
Re-examine EVERY link against quantum attackers
 Largely missing in PQC research…
9
Any quantum ingredient could be a threat
Task
I
II
Run quantum
factoring
algorithm
(to break public
key crypto)
Need
Availability
Full-scale fault-tolerant
QC
2017?
2013
Ex. Quantum entanglement
Quantum
attack classical
crypto
Available now
10
How does cryptography change in
a quantum world?
Post-Quantum Cryptography
Hard problems broken
Security framework fail
Construct on new problems
Analyze Security against
quantum adv
Quantum Cryptography
Outperform classical protocols
• Ex. Quantum key distribution
Crypto tools for quantum tasks
• Ex. Encrypt quantum data
NB. Many already available (even as commercial products)
11
This Talk
1 Quantum algorithms
• A recent breakthrough: quantum algorithm for high-degree
number fields
Application: break some lattice crypto!
• The Hidden Subgroup Problem & Quantum Fourier
Sampling
2 Examples: classical security framework inadequate
• Quantum Rewinding
• Quantum random oracle model
• Quantum attack on symmetric crypto
12
exponentially
Which problems admit faster |quantum〉
algorithms than classical algorithms?
∃ Poly-time quantum algorithms for:
Factoring and discrete logarithm [Shor’94]
Basic problems in
algebraic number
theory
Constant degree
number fields
Arbitrary degree
Unit group
Principal
Class group
ideal problem
[Hallgren’02’05,SV05]
[EHKS’STOC14]
[BS’SODA16]
Best known classical algorithms need
(at least) sub-exponential time
13
Our quantum algorithms for
Unit group, Principal ideal problem
Break several lattice-based cryptosystems
believed quantum safe before
𝐿
14
Breaking some lattice crypto
 For efficiency, often use problems in lattices w/ more structures
Short-PIP
Ring-LWE
?
…
Bad news: Short-PIP based cryptosystems are broken!
Our quantum alg’s
find A generator
FHEc, Multilinear
mappingd, PKE by
GCHQe... broken
Find a short
PIP
generator of Short-PIP
a principal
Classical procedure: reduce size
ideal lattice
of generator in cyclotomic
fieldse,f
cSmartV10
dGargGH13
eCampellGS15
fCramerDPR15
Find A
generator of a
principal ideal
lattice
15
How do quantum computers
solve these problems?
16
The Hidden Subgroup Problem (HSP) framework
INPUT
Reduction
Problem Π
Quantum Algorithm
OUTPUT
Solution to Π
HSP on a
group 𝐺
Captures most quantum exponential speedup
 Standard Def.: HSP on finite group 𝐺
𝑓
𝐺
𝑆
Given: oracle function 𝑓: 𝐺 → 𝑆, s.t. ∃ 𝐻 ≤ 𝐺,
𝐻
𝑥+𝐻
𝑧+𝐻
•
𝑠0
𝑠1
𝑠𝑘
1. (Periodic on 𝐻)
𝑥−𝑦 ∈𝐻 ⇒𝑓 𝑥 =𝑓 𝑦
2. (Injective on 𝐺/𝐻)
𝑥−𝑦 ∉𝐻 ⇒𝑓 𝑥 ≠𝑓 𝑦
Goal: Find (hidden subgroup) 𝐻.
Continuous 𝔾 (e.g. ℝ𝑛 ) tricky, but we can handle
[EHKS14]
17
Interesting HSP instances
Computational Problems
HSP on G
Factoring
Discrete logarithm
ℤ
ℤ𝑁 × ℤ𝑁
Number fields (PIP etc.)
ℝ𝑂(𝑛)
Simon’s problem (Crypto app
later)
Graph isomorphism
Unique shortest vector problem
Abelian groups
∃ efficient quantum
algs
ℤ𝑛2
Symmetric group
Dihedral group
Non-abelian
Open question:
? efficient quantum
algs
18
Solving HSP: quantum Fourier sampling
Given: oracle 𝑓: 𝐺 → 𝑆 periodic on 𝐻 & …
Real Domain
ℱℤ𝑁
𝐺 = 𝑍𝑁
0
Fourier Spectrum
𝑟
𝑁/𝑟 2𝑁/𝑟
Noise becomes
intolerable as
dimension grows!
𝐺=ℤ
−𝑟
0
𝑟
−𝑟
0
𝑟
2.
Quantum Fourier Sampling:
• Quantum Fourier transform &
measure
Recover 𝐻 from samples
Old method for ℝ𝑐𝑜𝑛𝑠𝑡𝑎𝑛𝑡
• Discretize & Truncate
• Reduce to finite 𝐺
Our method for continuous ℝ𝑚
ℱℝ
𝐺=ℝ
Standard method for finite 𝐺
1.
0
𝑁−1
Goal: find 𝐻
• Informal: try to approx. sample
the ideal Fourier spectrum
directly!
−1/𝑟 0 1/𝑟
19
This Talk
1 Quantum algorithms
• A recent breakthrough: quantum algorithm for high-degree
number fields
Application: break some lattice crypto!
• The Hidden Subgroup Problem & Quantum Fourier
Sampling
2 Examples: classical security framework inadequate
• Quantum Rewinding
• Quantum random oracle model
• Quantum attack on symmetric crypto
20
Recall: classical security framework fails
 Security model inadequate for quantum attackers
✗
Crypto
?
Quantum security models:
Still at early stage
scheme Σ
Quantum hard
problem Π
 Classical proofs can fail against quantum attackers
✗
Many
PostQuantumC only
consider classical
attackers in proofs
See more in [Song’PQC14]
Lattice 𝐿
Short
vector
𝐵
𝐴 breaks
Encryption
?
Assume attacker 𝐴 breaks scheme Σ,
 Construct 𝐵 from 𝐴 solving hard problem Π.
21
I. Difficulty of quantum rewinding
 Rewinding argument
• Take snapshot of an adversary & continue
• Later “rewind” & restart from snapshot
𝐵
𝐴
𝐴
?
 Rewinding quantum adversary difficult
• Cannot copy unknown quantum state
• Information gain  disturbance on stateOnly special cases
possibleg
g[Watrous09
Quantum security of many classical protocols unclear ]
 Not often seen in PQC literature?
• Usually does not affect analysis of encryption, signature, …
• But does matter: e.g. Quantum-secure Identification scheme
(to get signature by Fiat-Shamir)
22
II. Hash function: common heuristic fails?
 Hash functions are everywhere:
Signature, message
authentication, key derivation,
bitcoin,…
 The Random Oracle (RO) heuristic widely used
• “Lazy” sampling: decide 𝐻 ⋅ on-the-fly
• Program RO: change 𝐻(⋅) adaptively
• Ease security proof of hash-based schemes
(otherwise impossible)
 Quantum-accessible Random Oracle
𝑥
𝐻(𝑥)
Hash Function
𝐻
• Nothing appears to work…
Σ𝑥 |𝑥〉
• A lot exciting developement restoring classical proofs
Σ𝑥 𝑥 |𝐻 𝑥 〉
23
III. Quantum attacking symmetric crypto
3-round Feistel Cipher
CBC-MAC
…
[KM10]
[KLL+16]
[SS’16]
Simon’s Problem
≡
HSP on ℤ𝑛2
Easy on a quantum computer
Broken!?
 These attacks need specific* quantum model
• Assume attackers have QUANTUM access to the
SECRET enc/auth algorithm
* In my opinion
unrealistic but
still possible
 Quantum random oracle is more justified
• Hash functions are public, any (quantum) user can implement it quantumly
24
Concluding Remarks
How does cryptography change in a quantum world?
Post-Quantum Cryptography
Hard problems broken
Security framework fail
Construct on new problems
Analyze Security against
quantum adv
Need more study on
(quantum) hardness
Be aware and cautious!
Many issues unclear
Quantum Cryptography
Possible complement
25
I’m hiring
 2-3 PhD students to work on
• Quantum algorithms
• Analyzing quantum security of classical crypto
• Quantum crypto
 Maybe 1 Post-doc too
 Get in touch if interested
 Young but strong in
• Check my webpage for more: fangsong.info
• Email: [email protected]
• Programming language, machine learning,
vision, …
• Portland is absolutely nice in many ways~
Thank you!
26