论文标题

带经典通信的量子密码学:平行远程状态准备,用于拷贝保护,验证等

Quantum cryptography with classical communication: parallel remote state preparation for copy-protection, verification, and more

论文作者

Gheorghiu, Alexandru, Metger, Tony, Poremba, Alexander

论文摘要

量子机械效应使得在经典上是不可能的加密原语的构建。例如,量子复制保护允许以量子状态对程序进行编码,从而可以评估程序但不能复制程序。这些加密原始图中的许多是两党协议,其中一方,鲍勃(Bob)具有完整的量子计算功能,而另一方仅需要将随机的BB84州发送给Bob。在这项工作中,假设Bob无法有效地解决LWE问题,我们将如何将这些协议通常转换为Alice完全经典的协议。特别是,这意味着(经典)爱丽丝和(量子)鲍勃之间的所有沟通都是经典的,但是它们仍然可以利用加密原语,如果双方都是经典的,那是不可能的。我们应用此转换过程以获得具有经典通信的量子加密协议,以进行无统治的加密,拷贝保护,对加密数据计算以及可验证的盲目授权计算。我们结果的关键技术成分是用于BB84状态的经典并行远程状态制备的协议。这是(经典)爱丽丝和(量子多项式时间)BOB之间的一个多轮协议,该协议允许爱丽丝证明鲍勃必须准备$ n $均匀的随机BB84州(最多可以改变其空间基础)。此外,爱丽丝知道鲍勃已经准备好了哪些特定的BB84州,而鲍勃本人则没有。因此,该协议末尾的情况(几乎)等同于Alice向Bob发送$ N $随机BB84州的情况。这使我们能够以通用和模块化的方式替换现有协议中准备和发送BB84状态的步骤。

Quantum mechanical effects have enabled the construction of cryptographic primitives that are impossible classically. For example, quantum copy-protection allows for a program to be encoded in a quantum state in such a way that the program can be evaluated, but not copied. Many of these cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob. In this work, we show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem. In particular, this means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical. We apply this conversion procedure to obtain quantum cryptographic protocols with classical communication for unclonable encryption, copy-protection, computing on encrypted data, and verifiable blind delegated computation. The key technical ingredient for our result is a protocol for classically-instructed parallel remote state preparation of BB84 states. This is a multi-round protocol between (classical) Alice and (quantum polynomial-time) Bob that allows Alice to certify that Bob must have prepared $n$ uniformly random BB84 states (up to a change of basis on his space). Furthermore, Alice knows which specific BB84 states Bob has prepared, while Bob himself does not. Hence, the situation at the end of this protocol is (almost) equivalent to one where Alice sent $n$ random BB84 states to Bob. This allows us to replace the step of preparing and sending BB84 states in existing protocols by our remote-state preparation protocol in a generic and modular way.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源