Privacy Amplification in the Isolated Qubits Model
Isolated qubits are a special class of quantum devices, which can be used to implement tamper-resistant cryptographic hardware such as one-time memories (OTM’s). Unfortunately, these OTM constructions leak some information, and standard methods for privacy amplification cannot be applied here, because the adversary has advance knowledge of the hash function that the honest parties will use.
In this paper we show a stronger form of privacy amplification that solves this problem, using a fixed hash function that is secure against all possible adversaries in the isolated qubits model. This allows us to construct single-bit OTM’s which only leak an exponentially small amount of information.
We then study a natural generalization of the isolated qubits model, where the adversary is allowed to perform a polynomially-bounded number of entangling gates, in addition to unbounded local operations and classical communication (LOCC). We show that our technique for privacy amplification is also secure in this setting.
KeywordsHash Function Quantum Circuit Security Parameter Oblivious Transfer Kraus Operator
- 6.Liu, Y.-K.: Building one-time memories from isolated qubits. ITCS, pp. 269–286 (2014)Google Scholar
- 14.Bellare, M., Rompel, J.: Randomness-Efficient Oblivious Sampling. FOCS, 276–287 (1994)Google Scholar
- 16.Liu, Y.-K.: Privacy amplification in the isolated qubits model. Arxiv:1410.3918Google Scholar
- 22.Bouman, N.J., Fehr, S., González-Guillén, C., Schaffner, C.: An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification. In: Kawano, Y. (ed.) TQC 2012. LNCS, vol. 7582, pp. 29–44. Springer, Heidelberg (2012) Google Scholar
- 24.Childs, A.M., Leung, D., Mancinska, L., Ozols, M.: A framework for bounding nonlocality of state discrimination. arXiv:1206.5822
- 28.Trevisan, L., Vadhan, S.P.: Extracting Randomness from Samplable Distributions. FOCS, 32–42 (2000)Google Scholar
- 30.Gabizon, A.: Deterministic Extraction from Weak Random Sources, Springer-Verlag (2011)Google Scholar