Entropy Accumulation under Post-Quantum Cryptographic Assumptions

07/02/2023
by   Ilya Merkulov, et al.
0

In device-independent (DI) quantum protocols, the security statements are oblivious to the characterization of the quantum apparatus - they are based solely on the classical interaction with the quantum devices as well as some well-defined assumptions. The most commonly known setup is the so-called non-local one, in which two devices that cannot communicate between themselves present a violation of a Bell inequality. In recent years, a new variant of DI protocols, that requires only a single device, arose. In this novel research avenue, the no-communication assumption is replaced with a computational assumption, namely, that the device cannot solve certain post-quantum cryptographic tasks. The protocols for, e.g., randomness certification, in this setting that have been analyzed in the literature used ad hoc proof techniques and the strength of the achieved results is hard to judge and compare due to their complexity. Here, we build on ideas coming from the study of non-local DI protocols and develop a modular proof technique for the single-device computational setting. We present a flexible framework for proving the security of such protocols by utilizing a combination of tools from quantum information theory, such as the entropic uncertainty relation and the entropy accumulation theorem. This leads to an insightful and simple proof of security, as well as to explicit quantitative bounds. Our work acts as the basis for the analysis of future protocols for DI randomness generation, expansion, amplification and key distribution based on post-quantum cryptographic assumptions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/20/2021

Semi-device-independent full randomness amplification based on energy bounds

Quantum Bell nonlocality allows for the design of protocols that amplify...
research
04/14/2018

Summoning, No-Signaling and Relativistic Bit Commitments

Summoning is a task between two parties, Alice and Bob, with distributed...
research
05/11/2020

Simpler Proofs of Quantumness

A proof of quantumness is a method for provably demonstrating (to a clas...
research
03/09/2022

Generalised entropy accumulation

Consider a sequential process in which each step outputs a system A_i an...
research
07/08/2018

Coalgebraic Tools for Randomness-Conserving Protocols

We propose a coalgebraic model for constructing and reasoning about stat...
research
09/15/2021

Beating Classical Impossibility of Position Verification

Chandran et al. (SIAM J. Comput.'14) formally introduced the cryptograph...
research
06/06/2023

Correlated Pseudorandomness from the Hardness of Quasi-Abelian Decoding

Secure computation often benefits from the use of correlated randomness ...

Please sign up or login with your details

Forgot password? Click here to reset