Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

From MaRDI portal
Publication:3177810

DOI10.1145/2885493zbMATH Open1407.94143arXiv1402.0489OpenAlexW2535210057WikidataQ130920921 ScholiaQ130920921MaRDI QIDQ3177810FDOQ3177810


Authors: Carl A. Miller, Yaoyun Shi Edit this on Wikidata


Publication date: 2 August 2018

Published in: Journal of the ACM, Proceedings of the forty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Abstract: Randomness is a vital resource for modern day information processing, especially for cryptography. A wide range of applications critically rely on abundant, high quality random numbers generated securely. Here we show how to expand a random seed at an exponential rate without trusting the underlying quantum devices. Our approach is secure against the most general adversaries, and has the following new features: cryptographic level of security, tolerating a constant level of imprecision in the devices, requiring only a unit size quantum memory per device component for the honest implementation, and allowing a large natural class of constructions for the protocol. In conjunct with a recent work by Chung, Shi and Wu, it also leads to robust unbounded expansion using just 2 multi-part devices. When adapted for distributing cryptographic keys, our method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance. The proof proceeds by showing that the Renyi divergence of the outputs of the protocol (for a specific bounding operator) decreases linearly as the protocol iterates. At the heart of the proof are a new uncertainty principle on quantum measurements, and a method for simulating trusted measurements with untrusted devices.


Full work available at URL: https://arxiv.org/abs/1402.0489




Recommendations




Cites Work


Uses Software





This page was built for publication: Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3177810)