Optical scheme for cryptographic commitments with physical unclonable keys

  title={Optical scheme for cryptographic commitments with physical unclonable keys},
  author={Georgios M. Nikolopoulos},
  journal={Optics express},
  volume={27 20},
We investigate the possibility of using multiple-scattering optical media, as resources of randomness in cryptographic tasks pertaining to commitments and auctions. The proposed commitment protocol exploits standard wavefront-shaping and heterodyne-detection techniques, and can be implemented with current technology. Its security is discussed in the framework of a tamper-resistant trusted setup. 

Figures from this paper

Intercept-Resend Emulation Attacks Against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys

This work investigates the robustness of a continuous-variable protocol, which relies on the scattering of coherent states of light from the key, against three different types of intercept–resend emulation attacks.

Remote quantum-safe authentication of entities with physical unclonable functions

This work proposes a protocol, which can operate over large distances, and offers security against both classical and quantum adversaries, and is fully compatible with the infrastructure of existing and future photonic networks, and it can operate in parallel with other quantum protocols, including QKD protocols.



Continuous-variable quantum authentication of physical unclonable keys: Security against an emulation attack

We consider a recently proposed entity authentication protocol, in which a physical unclonable key is interrogated by random coherent states of light, and the quadratures of the scattered light are

Quantum-secure authentication of a physical unclonable key

This work experimentally demonstrate quantum-secure authentication (QSA) of a classical multiple-scattering key by illuminating it with a light pulse containing fewer photons than spatial degrees of freedom and verifying the spatial shape of the reflected light.

Continuous-variable quantum authentication of physical unclonable keys

The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of standard wavefront-shaping techniques that direct the scattered photons coherently to a specific target mode at the output.

Experimental implementation of bit commitment in the noisy-storage model.

This work experimentally executed a bit commitment protocol that is secure as long as the attacker's quantum memory device is imperfect, and provides a general analysis of this protocol for a range of experimental parameters.

Physical key-protected one-time pad

The ability to securely couple the randomness contained within two unique physical objects can extend to strengthen hardware required by a variety of cryptographic protocols, which is currently a critically weak link in the security pipeline of the authors' increasingly mobile communication culture.

Unconditionally Secure Bit Commitment by Transmitting Measurement Outcomes

  • A. Kent
  • Computer Science
    Physical review letters
  • 2012
A new unconditionally secure bit commitment scheme based on Minkowski causality and the properties of quantum information is proposed based on Bennett-Brassard 1984 qubits and the impossibility of superluminal signalling.

Quantum cryptography beyond quantum key distribution

This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.

Experimental bit commitment based on quantum communication and special relativity.

This paper reports on an implementation of a bit commitment protocol using quantum communication and special relativity and has the advantage that it is practically feasible with arbitrary large separations between the agents in order to maximize the commitment time.

Quantum key establishment via a multimode fiber.

This work proposes and demonstrates a fundamentally new concept for remote key establishment that allows high-dimensional alphabets using spatial degrees of freedom by transmitting information through a light-scrambling multimode fiber and exploiting the no-cloning theorem.

Applications of single-qubit rotations in quantum public-key cryptography

This work presents an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics and maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo's theorem.