CryptoDB
Tianwei Zhang
Publications and invited talks
Year
Venue
Title
2025
TCC
A Computational Monogamy of Entanglement Theorem with Applications to Non-Interactive Quantum Key Distribution
Abstract
Quantum key distribution (QKD) enables Alice and Bob to exchange a secret key over a public, untrusted quantum channel.
Compared to classical key exchange, QKD achieves \emph{everlasting security}: after the protocol execution the key is secure against adversaries that can do unbounded computations.
On the flip side, while classical key exchange can be achieved non-interactively (with two simultaneous messages between Alice and Bob), no non-interactive protocol is known that provides everlasting security, even using quantum information.
In this work, we make progress on this problem. Our main technical contribution is a \emph{computational} variant of the celebrated \emph{monogamy of entanglement} game, where the secret is only computationally hidden from the players, rather than information-theoretically. In these settings, we prove a negligible bound on the maximal winning probability over all strategies.
As a direct application, we obtain a non-interactive (simultaneous message) QKD protocol from any post-quantum classical non-interactive key exchange, which satisfies everlastingly secure \emph{assuming Alice and Bob agree on the same key}.
The protocol only uses EPR pairs and standard and Hadamard basis measurements, making it suitable for near-term quantum hardware.
We also propose how to convert this protocol into a two-round protocol that satisfies the standard notion of everlasting security.
Finally, we prove a \emph{no-go theorem} which establishes that (in contrast to the case of ordinary multi-round QKD) entanglement is necessary for non-inter\-active QKD, i.e., the messages sent by Alice and Bob cannot both be unentangled with their respective quantum memories if the protocol is to be everlastingly secure.
2024
CRYPTO
Time-Lock Puzzles from Lattices
Abstract
Time-lock puzzles (TLP) are a cryptographic tool that allow one to encrypt a message into
the future, for a predetermined amount of time T . At present, we have only two constructions with provable security: One based on the repeated squaring assumption and the other based on indistinguishability obfuscation (iO). Basing TLP on any other assumption is a long-standing question, further motivated by the fact that know constructions are broken by quantum algorithms.
In this work, we propose a new approach to construct time-lock puzzles based on lattices,
and therefore with plausible post-quantum security. We obtain the following main results:
• In the preprocessing model, where a one-time public-coin preprocessing is allowed, we
obtain a time-lock puzzle with encryption time log(T ).
• In the plain model, where the encrypter does all the computation, we obtain a time-lock
puzzle with encryption time √T .
Both constructions assume the existence of any sequential function f , and the hardness of the circular small-secret learning with errors (LWE) problem.
At the heart of our results is a new construction of succinct randomized encodings (SRE)
for T-folded repeated circuits, where the complexity of the encoding is √T . This is the first
construction of SRE where the overall complexity of the encoding algorithm is sublinear in the runtime T , and which is not based on iO. Using our SRE we directly obtain the first non-
interactive RAM delegation scheme with sublinear complexity (in the number of steps T ), again without iO. Finally, we also propose a new heuristic construction of SREs, and consequently of TLPs, with fully-efficient encoding complexity log(T ). Our scheme is inspired by iO techniques, but carefully sidesteps the regime of zeroizing attacks that plague lattice-based iO candidates.
Coauthors
- Shweta Agrawal (1)
- Alex B. Grilo (1)
- Giulio Malavolta (2)
- Michael Walter (1)
- Tianwei Zhang (2)