![]() van Wier, Jeroen ![]() Doctoral thesis (2023) Secure communication plays an important role in our everyday life, from the messages we send our friends to online access to our banking. In fact, we can hardly imagine a world without it. With quantum ... [more ▼] Secure communication plays an important role in our everyday life, from the messages we send our friends to online access to our banking. In fact, we can hardly imagine a world without it. With quantum computers on the rise, it is critical for us to consider what security might look like in the future. Can we rely on the principles we use today? Or should we adapt them? This thesis asks exactly those questions. We will look at both the quantum setting, where we consider communication between quantum computers, and the post-quantum setting, where we consider communication between classical computers in the presence of adversaries with quantum computers. In this thesis, we will consider security questions centred around misleading others, by considering to what extent the exchange of secrets can be denied, misconstructed, or modified. We do this by exploring three security principles. Firstly, we consider deniability for quantum key exchange, which describes the ability to generate secure keys without leaving evidence. As quantum key exchange can be performed without a fully-fledged quantum computer, using basic quantumcapable machines, this concept is already close to becoming a reality. We explore the setting of public-key authenticated quantum key exchange, and define a simulationbased notion of deniability. We show how this notion can be achieved through an adapted form of BB84, using post-quantum secure strong designated-verifier signature schemes. Secondly, we consider plaintext-awareness, which addresses the security of a scheme by looking at the ability of an adversary to generate ciphertexts without knowing the plaintext. Here two settings are considered. Firstly, the post-quantum setting, in which we formalize three different plaintext-awareness notions in the superposition access model, show their achievability and the relations between them, as well as in which settings they can imply ciphertext indistinguishability. Next, the quantum setting, in which we adapt the same three plaintext-awareness notions to a setting where quantum computers are communicating with each other, and we again show achievability and relations with ciphertext indistinguishability. Lastly, we consider non-malleability, which protects a message from attacks that alter the underlying plaintext. Overcoming the notorious “recording barrier” known from generalizing other integrity-like security notions to quantum encryption, we generalize one of the equivalent classical definitions, comparison-based non-malleability, to the quantum setting and show how this new definition can be fulfilled. We also show its equivalence to the classical definition when restricted to a post-quantum setting. [less ▲] Detailed reference viewed: 37 (3 UL)![]() Ebrahimi, Ehsan ![]() ![]() in Post-quantum Plaintext-awareness (2022, September 28) Detailed reference viewed: 50 (27 UL)![]() van Wier, Jeroen ![]() ![]() ![]() E-print/Working paper (n.d.) In this work, we explore the notion of deniability in public-key authenticated quantum key exchange (QKE), which allows two parties to establish a shared secret key without leaving any evidence that would ... [more ▼] In this work, we explore the notion of deniability in public-key authenticated quantum key exchange (QKE), which allows two parties to establish a shared secret key without leaving any evidence that would bind a session to either party. The deniability property is expressed in terms of being able to simulate the transcripts of a protocol. The ability to deny a message or an action has applications ranging from secure messaging to secure e-voting and whistle-blowing. While quite well-established in classical cryptography, it remains largely unexplored in the quantum setting. Here, we first present a natural extension of classical definitions in the simulation paradigm to the setting of quantum computation and formalize the requirements for a deniable QKE scheme. We then prove that the BB84 variant of QKE, when authenticated using a strong designated verifier signature scheme, satisfies deniability and, finally, propose a concrete instantiation. [less ▲] Detailed reference viewed: 89 (12 UL) |
||