Arxiv:2104.04742V2 [Quant-Ph] 13 Apr 2021 Keywords: Quantum Cryptography, Remote State Preparation, Zero-Knowledge, Learning with Errors Table of Contents
Total Page:16
File Type:pdf, Size:1020Kb
Non-Destructive Zero-Knowledge Proofs on Quantum States, and Multi-Party Generation of Authorized Hidden GHZ States Léo Colisson 1, Frédéric Grosshans 1, Elham Kashefi1,2 1 Laboratoire d’Informatique de Paris 6 (LIP6), Sorbonne Université, 4 Place Jussieu, 75252 Paris CEDEX 05, France {leo.colisson, frederic.grosshans}@lip6.fr 2 School of Informatics, University of Edinburgh, 10 Crichton Street, Edinburgh EH8 9AB, UK Abstract. Due to the special no-cloning principle, quantum states appear to be very useful in cryptography. But this very same property also has drawbacks: when receiving a quantum state, it is nearly impossible for the receiver to efficiently check non-trivial properties on that state without destroying it. This allows a malicious sender to send maliciously crafted states without being detected. The natural (destructive) method for testing a quantum state is the “cut-and-choose” method. However, this method has many drawbacks: the security is only linear, and the class of states and properties that can be tested is quite restricted. In this work, we propose a different approach, and we initiate the study of Non-Destructive Zero-Knowledge Proofs on Quantum States. Our method binds a quantum state to a classical encryption of that quantum state. That way, the receiver can obtain guarantees on the quantum state by asking to the sender to prove properties directly on the classical encryption. This method is therefore non-destructive, and it is possible to verify a very large class of properties. For instance, we can force the sender to send different categories of states depending on whether they know a classical password or not. Moreover, we can also provide guarantees to the sender: for example, we can ensure that the receiver will never learn whether the sender knows the password or not. We also extend this method to the multi-party setting. We show how it can prove useful to distribute a GHZ state between different parties, in such a way that only parties knowing a secret can be part of this GHZ. Moreover, the identity of the parties that are part of the GHZ remains hidden to any malicious party. A direct application would be to allow a server to create a secret sharing of a qubit between unknown parties, authorized for example by a third party Certification Authority. Finally, we provide simpler “blind” versions of the protocols that could prove useful in Anonymous Transmission or Quantum Onion Routing, and we explicit a cryptographic function required in our protocols based on the Learning With Errors hardness problem. arXiv:2104.04742v2 [quant-ph] 13 Apr 2021 Keywords: Quantum Cryptography, Remote State Preparation, Zero-Knowledge, Learning With Errors Table of Contents 1 Introduction . .3 1.1 Our Results . .3 1.2 Related works. .4 1.3 Paper Organization . .5 2 Technical overview and presentation of the setup . .5 2.1 Initial setup . .5 2.2 List of the protocols proposed in this work. .6 2.3 Quick overview of our methods . .8 3 Preliminaries . 10 3.1 Notation . 10 3.2 Generalized hidden GHZ state . 12 3.3 Classical Zero-Knowledge proofs and arguments for NP..................... 12 3.4 Classical Multi-Party Computations . 14 3.5 Introduction to the Learning With Errors (LWE) problem . 15 3.6 The [MP12] Construction . 18 4 Cryptographic requirements . 21 5 The different protocols. 24 5.1 The protocol BLIND .................................................... 24 5.2 The protocol BLINDsup ................................................. 25 5.3 The impossible protocol BLINDcan ........................................ 26 sup 5.4 The protocol BLINDcan .................................................. 27 5.5 The protocol AUTH BLINDdist .......................................... 30 − can 6 Function construction . 38 6.1 Construction of a δ-GHZH capable family . 38 6.2 Generic construction to create distributable δ0-GHZcan capable primitives from δ-GHZH capable primitives . 44 7 Acknowledgement . 47 1 Introduction Due to the special no-cloning principle, quantum states appear to be very useful in cryptography. But this very same property also has drawbacks: when receiving a quantum state, it is nearly impossible for the receiver to efficiently check non-trivial properties on that state without destroying it. This allows malicious sender to send maliciously crafted states without being detected. To illustrate this, let us imagine the following simple goal: a receiver receives a quantum state, 1 iθ π 7π and would like to make sure that this state is a +θ := √ ( 0 +e 1 ), with θ 0, ,..., , | i 2 | i | i ∈ { 4 4 } and not a complicated, maliciously prepared, entangled state. A first naive method would be, maybe, to ask to the sender to commit before on the value of θ and then, during a test run, to open the commitment and let the sender measure the state using this angle in order to test if the qubit indeed corresponds to a +θ state. The problems of this kind of methods are | i three-fold: – The test is destructive: once the measurement is done, the qubit is destroyed. This means that this qubit will not be usable later in any protocol. The usual “quantum way” of solving this problem is to use a “cut-and-choose” method: repeat this operation many times (say N), randomly select one run which will not be tested, and test (i.e. destroy) the other N 1 − ones. If all tests pass, then the remaining, non tested qubit can be used later. – But this cut-and-choose method has another problem: the security scales only (at most) linearly with the number of qubits. A malicious sender could be honest in N 1 runs and − send a completely malicious state for one of the runs. If the receiver decides not to test this 1 run (probability N ) and uses it in other protocols, then the sender managed to trick the receiver. – And finally, there are cases where the cut-and-choose method cannot even apply: for example when the value of the state must be kept secret, or if this value must depend on a secret information. Indeed, the angle θ that is revealed during all the test runs may contain valuable information. For example, one could imagine a desired protocol in which the sender is only allowed to send a +θ with θ = 0, π if they know the password of the local Mafia, | i { } π 3π and otherwise the sender would be expected to generate states for which θ , . We ∈ { 2 2 } can see that cut-and-choose does not help us here: revealing the value of θ during the test runs would leak to the receiver whether the sender is part of the Mafia or not. Moreover, the server has no way to enforce someone that is not part of the Mafia to generate a +θ | i with θ 0, π . ∈ { } This work: The method that we propose here solves these three issues altogether: we provide a way to obtain a quantum state, do tests on it without destroying it, in such a way that the probability of cheating is negligible (but the security is computational), and the tests are performed in such a way that we can test properties linking secret classical data (like passwords) to the produced quantum state. In this work, we also generalize this idea to multi-party quantum states, and focus on the generation of distributed GHZ states with special properties. 1.1 Our Results In this work: 1. We initiate the study of Non-Destructive Zero-Knowledge Proofs on Quantum States. We are able to obtain these guarantees by changing the way the sender sends the quantum state. Instead of sending a quantum state directly, the sender sends classical data encrypting a target class of quantum states. Then, the receiver will use this classical encryption to produce one quantum state. Since the quantum state is now tightly bound to the classical encryption, the receiver is able to obtain guarantees on the obtained quantum state by using classical protocols directly on the classical state, such as Zero-Knowledge (ZK) or Multi-Party Computation (MPC) protocols. 3 The advantages are numerous: this verification is non-destructive, can be done over a purely classical channel, and it is now possible to check much more involved properties on the quantum state, potentially linked with secret classical information or involving multiple parties. For instance, we can force the sender to send different categories of states depending on whether or not they know a classical password or signature. While it is not the first time that LWE based methods are used in quantum cryptography to protect the sender, to the best of our knowledge, it is the first time that this kind of cryptography is used to also protect the receiver. This allows us to bypass fundamental quantum limitations, and our result suggests the existence of a “classical advantage”, i.e. a class of problems that cannot be solved via more traditional purely quantum protocols. We expect this result to have further independent interests. 2. We present a concrete usecase in the context of the generation of multi-party certified hidden GHZ states. We derive a protocol between a server and n “applicants”. At the end of the protocol, the applicants end-up sharing a GHZ state in such a way that, if the server is honest, only the applicants knowing a classical secret (password/secret key/signature/. ) can be part of the GHZ (they are then said to be supported). Others applicant will not be entangled in any way with the supported applicants, and therefore cannot disturb a potential future protocol. Our protocol has the following properties: – The protocol is blind, in the sense that no adversary (corrupting potentially the server and some applicants) can learn whether the honest applicants are supported or not.