Quantum-Access-Secure Message Authentication via Blind-Unforgeability

被引:26
作者
Alagic, Gorjan [1 ,2 ]
Majenz, Christian [3 ,4 ]
Russell, Alexander [5 ]
Song, Fang [6 ]
机构
[1] Univ Maryland, QuICS, Gaithersburg, MD 20742 USA
[2] NIST, Gaithersburg, MD 20742 USA
[3] QuSoft, Amsterdam, Netherlands
[4] Ctr Wiskunde & Informat, Amsterdam, Netherlands
[5] Univ Connecticut, Dept Comp Sci & Engn, Storrs, CT USA
[6] Texas A&M Univ, Dept Comp Sci & Engn, College Stn, TX USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III | 2020年 / 12107卷
关键词
D O I
10.1007/978-3-030-45727-3_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Formulating and designing authentication of classical messages in the presence of adversaries with quantum query access has been a longstanding challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum setting. A particular difficulty is how to fairly capture the notion of "predicting an unqueried value" when the adversary can query in quantum superposition. We propose a natural definition of unforgeability against quantum adversaries called blind unforgeability. This notion defines a function to be predictable if there exists an adversary who can use "partially blinded" oracle access to predict values in the blinded region. We support the proposal with a number of technical results. We begin by establishing that the notion coincides with EUF-CMA in the classical setting and go on to demonstrate that the notion is satisfied by a number of simple guiding examples, such as random functions and quantum-query-secure pseudorandom functions. We then show the suitability of blind unforgeability for supporting canonical constructions and reductions. We prove that the "hash-and-MAC" paradigm and the Lamport one-time digital signature scheme are indeed unforgeable according to the definition. To support our analysis, we additionally define and study a new variety of quantumsecure hash functions called Bernoulli-preserving. Finally, we demonstrate that blind unforgeability is strictly stronger than a previous definition of Boneh and Zhandry [EUROCRYPT '13, CRYPTO '13] and resolve an open problem concerning this previous definition by constructing an explicit function family which is forgeable yet satisfies the definition.
引用
收藏
页码:788 / 817
页数:30
相关论文
共 31 条
[11]  
Czajkowski Jan, 2019, IACR Cryptol. ePrint Arch
[12]   A quantum algorithm for computing the unit group of an arbitrary degree number field [J].
Eisentrager, Kirsten ;
Hallgren, Sean ;
Kitaev, Alexei ;
Song, Fang .
STOC'14: PROCEEDINGS OF THE 46TH ANNUAL 2014 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2014, :293-302
[13]   Semantic Security and Indistinguishability in the Quantum World [J].
Gagliardoni, Tommaso ;
Huelsing, Andreas ;
Schaffner, Christian .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :60-89
[14]   New Security Notions and Feasibility Results for Authentication of Quantum Data [J].
Garg, Sumegha ;
Yuen, Henry ;
Zhandry, Mark .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 :342-371
[15]   Optimal sequence of quantum measurements in the sense of Stein's lemma in quantum hypothesis testing [J].
Hayashi, M .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2002, 35 (50) :10759-10773
[16]   Breaking Symmetric Cryptosystems Using Quantum Period Finding [J].
Kaplan, Marc ;
Leurent, Gaetan ;
Leverrier, Anthony ;
Naya-Plasencia, Maria .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :207-237
[17]  
Kuwakado H, 2012, 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2012), P312
[18]   Quantum Distinguisher Between the 3-Round Feistel Cipher and the Random Permutation [J].
Kuwakado, Hidenori ;
Morii, Masakatu .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2682-2685
[19]  
Lamport L., 1979, CONSTRUCTING DIGITAL
[20]  
Peikert C, 2008, ACM S THEORY COMPUT, P187