# Quantum Entropic Security and Approximate Quantum Encryption

@article{Desrosiers2010QuantumES, title={Quantum Entropic Security and Approximate Quantum Encryption}, author={Simon Pierre Desrosiers and Fr{\'e}d{\'e}ric Dupuis}, journal={IEEE Transactions on Information Theory}, year={2010}, volume={56}, pages={3455-3464} }

An encryption scheme is said to be entropically secure if an adversary whose min-entropy on the message is upper bounded cannot guess any function of the message. Similarly, an encryption scheme is entropically indistinguishable if the encrypted version of a message whose min-entropy is high enough is statistically indistinguishable from a fixed distribution. We present full generalizations of these two concepts to the encryption of quantum states in which the quantum conditional min-entropy…

## 23 Citations

Quantum entropic security

- Computer Science, Mathematics
- 2009

This work proves for the first time that one can prove security for encryption schemes while allowing entanglement with the adversary and yet not requiring perfect security, in a fully generalized model of entropic security.

On statistically-secure quantum homomorphic encryption

- Computer Science, MathematicsQuantum Inf. Comput.
- 2018

This work provides a limitation for the first question that an ITS quantum FHE necessarily incurs exponential overhead and proposes a QHE scheme for the instantaneous quantum polynomial-time (IQP) circuits.

Entropic security in quantum cryptography

- Computer Science, MathematicsQuantum Inf. Process.
- 2009

A generalization of a cipher described by Dodis and Smith is proposed and it is shown that it can actually encrypt n qubits using less than n classical bits of key under reasonable conditions and yet be secure in an information theoretic setting.

Computational Security of Quantum Encryption

- Computer Science, MathematicsICITS
- 2016

This work develops natural definitions for private-key and public-key encryption schemes for quantum data and defines notions of semantic security and indistinguishability, and constructs secure quantum encryption schemes from basic primitives.

Quantum Encryption and Generalized Quantum Shannon Impossibility.

- Computer Science
- 2018

The famous Shannon impossibility result says that any encryption scheme with perfect secrecy requires a secret key at least as long as the message. In this paper we provide its quantum analogue with…

Quantum encryption and generalized Shannon impossibility

- Computer ScienceDes. Codes Cryptogr.
- 2019

This paper provides its quantum analogue with imperfect secrecy and imperfect correctness and gives a systematic study of information-theoretically secure quantum encryption with two secrecy definitions, showing that the weaker one implies the stronger but with a security loss in d.

Quantum homomorphic encryption from quantum codes

- Computer Science, MathematicsPhysical Review A
- 2018

A quantum encryption scheme which is homomorphic for arbitrary classical and quantum circuits which have at most some constant number of non-Clifford gates is presented.

Approximate quantum encryption with even shorter keys

- Computer Science, Mathematics
- 2022

It is shown that key length n+ 2 3 log 1 ε suffices to encrypt n qubits in such a way that the cipherstate has trace distance ≤ ε from the fully mixed state.

Leftover Hashing against quantum side information

- Computer Science, Mathematics2010 IEEE International Symposium on Information Theory
- 2010

A (strictly) more general version of the Leftover Hash Lemma that is valid even if side information is represented by the state of a quantum system is proved and applies to arbitrary δ-almost two-universal families of hash functions.

IND-secure quantum symmetric encryption based on point obfuscation

- Computer Science, MathematicsQuantum Inf. Process.
- 2019

It is rigorously proved that IND-secure quantum symmetric encryption can be realized by quantum point obfuscators and can implement IND-CPA (indistinguishability under chosen plaintext attack) or leakage-resilient quantum asymmetric encryption, respectively.

## References

SHOWING 1-10 OF 29 REFERENCES

Entropic security in quantum cryptography

- Computer Science, MathematicsQuantum Inf. Process.
- 2009

A generalization of a cipher described by Dodis and Smith is proposed and it is shown that it can actually encrypt n qubits using less than n classical bits of key under reasonable conditions and yet be secure in an information theoretic setting.

Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption

- Computer ScienceAPPROX-RANDOM
- 2004

A quantum encryption scheme (also called private quantum channel, or state randomization protocol) is a one-time pad for quantum messages that leaks a non-zero (though small) amount of information but require a shorter shared random key.

Entropic Security and the Encryption of High Entropy Messages

- Computer Science, MathematicsTCC
- 2005

It is shown that entropic security is equivalent to indistinguishability on pairs of input distributions of sufficiently high entropy, which is in turn related torandomness extraction from non-uniform distributions, and the connection to randomness extraction, to prove several new results on entropically-secure encryption.

How to fool an unbounded adversary with a short key

- Computer Science, MathematicsIEEE Transactions on Information Theory
- 2006

A family of encryption schemes is presented that guarantee that for any message space in {0, 1}n with minimum entropy n-lscr and for any Boolean function h:{0,1}n rarr {0-1}, no adversary can predict h(m) from the ciphertext of m with more than 1/nomega(1) advantage; this is achieved with keys of length lscr+omega (logn).

Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker

- Computer Science, MathematicsTCC
- 2007

A new randomness-extraction technique is proved, which is known to work in the classical setting, to be secure against a quantum attacker as well, and this result allows to extend the classical applications of this extractor to the quantum setting.

Probabilistic encryption & how to play mental poker keeping secret all partial information

- Computer Science, MathematicsSTOC '82
- 1982

This paper proposes an Encryption Scheme that possess the following property : An adversary, who knows the encryption algorithm and is given the cyphertext, cannot obtain any information about the…

Cryptographic Distinguishability Measures for Quantum-Mechanical States

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1999

This paper surveys four measures of distinguishability for quantum-mechanical states from the point of view of the cryptographer with a particular eye on applications in quantum cryptography, and obtains several inequalities that relate the quantum distinguishability measures to each other.

Randomizing Quantum States: Constructions and Applications

- Computer Science
- 2004

It is shown that there exists a set of roughly d’log d unitary operators whose average effect on every input pure state is almost perfectly randomizing, as compared to the d2 operators required to randomize perfectly.

Security of quantum key distribution

- Computer ScienceAusgezeichnete Informatikdissertationen
- 2005

This work proposes an approach which allows us to study general physical systems for which the above mentioned independence condition does not necessarily hold, and introduces new uncertainty measures, called smooth min- and max-entropy, which are generalizations of information-theoretical notions.