Cryptography in the Bounded-Quantum-Storage Model

This thesis initiates the study of cryptographic protocols in the bounded-quantum-storage model. On the practical side, simple protocols for Rabin Oblivious Transfer, 1-2 Oblivious Transfer and Bit Commitment are presented. No quantum memory is requi…

Authors: ** - **Christian Schaffner** (주 저자, Aarhus University, Ph.D.) - 공동 연구자: **Ivan Damgård**

Cryptography in the Bounded-Quantum-Storage Model
Cryptography in the Bounded-Quantum- S to rage Mo del Christian Schaffner PhD Dissertation BRICS Resea rch Scho ol D AIMI – Department of Computer Science University of Aarhus Denma rk Cryptograph y in the Bounded-Quantum-Storage Mo del A Dissertation Presen ted to the F acult y of Science of the Univ ersit y of Aarh us in P artial F ulfillmen t of the Requiremen ts for the PhD Degree b y Christian Schaffner official v ersion su bmitted: Marc h 2, 2007 final v ersion: Ma y 29, 2018 Abstract Cryptographic primitiv es su ch as o blivious transfer and bit commitmen t are imp ossible to realize if unconditional secur i t y is r e quired agai nst adve rsaries who are unb ounded in runn ing time and memory size. Therefore, it is a great c hallenge to come u p w it h r e strictions on the adversary’s capabilities such t hat on one hand interesting cryptographic primitiv es b eco me p ossible, but on the other hand the mo del is still realistic and as close to practice as p ossible. The b ounde d-quantum-stor age mo del is a p rime example of suc h a crypto- graphic mo del. In this thesis, we initiate the stud y of cryptographic prim itives with unconditional s e curit y un der the sole assumption that the adve rsary’s quantum memory is of b ounded size. Oblivious transfer and bit commitment can b e implemen ted in this mo del using protocols where honest parties need no quantum memory , wh er eas an adv ersarial play er needs to store at le ast a lar g e fr action of the total num b er of transmitted qub its in order to br eak the pr oto col. This is in sh arp con trast to the classical b ounded-memory mo del, where w e can only tolerate adv ersaries with memory of size p olynomially larger than the honest p la y ers’ memory size. On the practica l side, our proto cols are efficien t, non-inte ractiv e and can b e adapted to cop e with v arious kinds of noise in the transmission. In fact, they can b e implemente d using to day’s te chno lo g y . On the theoretical s id e, new entr opic unc ertainty r elations in vo lving min- en trop y are established and used to pro ve the securit y of proto cols in the b ound ed-quan tum-storage mo del according to new strong securit y d efinitions. The uncertain t y r elations lo w er b ound the min-en trop y of the enco d ing used in most quant um-cryp tographic proto cols and therefore contribute to the u nder- standing of the quan tum effects whic h these proto cols are based up on. T he most direct w a y to mak e use of these lo w er b ound s is b y assuming a quantum-memory b ound on the adversary . F or in stance, in the r ealistic setting of Quantum Key Distribution ( QK D ) against quantum-memory-b ounded ea vesdropp ers, the un- certain t y relation allo ws to p r o v e the s ecur it y of Q KD proto cols while toler- ating considerably higher er r or rates compared to the standard m o del with unboun ded adversaries. In addition, thou gh not directly related to the b ound ed-quan tum-storage mo del, a classical result about unconditionally secure 1- out-of-2 Oblivious T rans- fer ( 1 -2 OT ) is obtained. It is p oint ed out that the standard securit y requir e- men t f or 1 -2 OT of bits, namely that the receiv er only learns one of the bits sen t, h olds if and only if the receiv er has n o inform ation on the X OR of the iii t w o bits. This result generalize s to 1 -2 OT of strings, in w hic h case the security can b e c haracterized in terms of binary line ar functions . More pr ecisely , it is sho wn th at the receiv er learns only one of the t w o strings sent, if and only if h e has no information on the result of applying any binary linear fu nction whic h n on-trivially dep ends on b oth inputs to th e t w o strings. This result not only giv es new insigh t into the nature of 1 -2 OT , but it in particular provides a p owerful to ol for analyzing 1 -2 OT pr oto c ols . With this c haracteriza tion at hand, the r educibilit y of 1 -2 OT of strings to a wide r ange of wea ke r primitiv es follo ws by a v ery simple argument. iv Ac kno wledgem en ts I am grateful to ev ery one who h elp ed and supp orted me du ring m y P h D studies here in ˚ Arh us. First of all, I wan t to cordially thank my sup ervisors and co-authors Lou is Salv ail and Iv an Damg ˚ ard and the wh ole cryp tology group at D AIMI f or pr o- viding an excellen t environmen t for cryptographic research. Countless are th e hours I h av e sp en t discussing scienti fic as well as non-scientific issues with Lou is, mer ci b e auc oup ! I thank my other co-authors C laude Cr´ ep eau, S erge F ehr , Re- nato Renn er , George Sa vvides and J ¨ urg W ullsc hleger for man y inspiring visits and discussions. I app reciated very muc h b eing a PhD student in a w ell-organized and we ll- funded researc h group and to b e able to work in a brand -new building with plen t y of sp ace, great infrastru cture and alw a ys helpful and friendly staff and secretaries: Ellen, Hanne, K aren , Lene, Mic hael, and Uffe. Studying in ˚ Arh us has b een a great exp erience mainly b ecause of all the friends fr om the constan tly c hanging “gang” of foreign and Danish f ello ws at D AIMI including Alla n, Claud io, Claus, Doina, Gabi, Henrik, Jan, Jes- p er, Jo o y ong, Johan, Kevin, Mic hael, Mikk el, Mirk a, Run e, T ord, Thomas M, T omas, and T ro els; b u t not to forget the ones who h a v e left Denmark and are no w spread around the w orld: Barnie, Christopher, Eman uela a nd P aolo, Fitzi, Gosia and Darek, Jens, Jes ´ u s, Karl, Kirill, Marco, Nelly and Anto nio, Philipp, Thomas P , and Saurabh. I thank you all for the w onderfu l time, b oth at and off the table-soccer table. Sp ecial thanks to Gosia and Henr ik for constructiv e commen ts on the in tro du ction of this thesis and to J ¨ urg and S erge for fur ther commen ts. I w ould also lik e to thank Claude Cr´ ep eau for hosting me for a fanta stic summer half-y ear at McGill univ ersit y in Mon tr ´ eal wh ere I had the c hance to meet many int eresting p eople doing quan tum r esearch and exp erience the ex- citing sp ot wh ere the francophone part of North Americ a meets the anglophone rest of the cont inent. I thank Pr of. Andreas Win ter from the Univ ersit y of Bristol and Prof. Stefan W olf from ET H Z ¨ urich as w ell as Prof. Su sanne Bødk er from the Univ ersit y of Aarh us for agreeing to constitute the ev aluation committee for my PhD thesis. Last bu t not least, I wan t to express m y gratitude to m y family for their immense lov e and supp ort from the distance. I am infinitely grateful for the great childhoo d they gav e m e wh ich wa s and still is an inv aluable source of self-confidence for me. v This r esearc h was partially sup p orted by the E U Pro ject SECOQC , No: FP6- 2002- IST -1-506813. Christian Schaffner, ˚ Arhus, Mar ch 2, 2007. vi Con ten ts Abstract iii Ac kno wledgemen ts v Con ten ts vii 1 In tro duction 1 1.1 Cryptographic Mo dels and Basic Primitiv es . . . . . . . . . . . . 1 1.2 Classical Bounded-S torage Mo del . . . . . . . . . . . . . . . . . . 3 1.3 Con tributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Bounded-Quantum-Storage Mo del . . . . . . . . . . . . . 4 1.3.2 Characterization of Security of Classical 1 -2 OT . . . . . . 5 1.3.3 Quant um S ecur it y Definitions and Proto cols . . . . . . . 5 1.3.4 Quant um Uncertaint y Relations . . . . . . . . . . . . . . 7 1.3.5 QKD against Quantum-Memory-Bo und ed Ea v esdropp er . 9 1.4 Outline of the T hesis . . . . . . . . . . . . . . . . . . . . . . . . . 10 1.5 Related W ork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2 Preliminaries 12 2.1 Notatio n and Basic T o ols . . . . . . . . . . . . . . . . . . . . . . 12 2.2 Probabilit y Theory . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.3 Quant um In formation Theory . . . . . . . . . . . . . . . . . . . . 15 2.4 En tropies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 2.4.1 Classical R ´ en yi En trop y . . . . . . . . . . . . . . . . . . . 16 2.4.2 Smo oth R´ en yi Entrop y . . . . . . . . . . . . . . . . . . . . 19 2.4.3 Min-En tropy- Splitting Lemma . . . . . . . . . . . . . . . 22 2.4.4 En tropy of Qu an tum States . . . . . . . . . . . . . . . . . 23 2.5 Tw o-Univ ersal Hashing and Priv acy Amp lification . . . . . . . . 25 2.5.1 History and Setting of Priv acy Amplification . . . . . . . 25 2.5.2 Tw o-Univ ersal Hashing . . . . . . . . . . . . . . . . . . . 25 2.5.3 Priv ac y Am p lification against Quantum Ad v ersaries . . . 26 2.5.4 Classical Priv acy Amplification . . . . . . . . . . . . . . . 28 3 Classical Oblivious T ransfer 29 3.1 In tro du ction and Outline . . . . . . . . . . . . . . . . . . . . . . 29 3.2 Defining 1 -2 OT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 3.2.1 Randomized 1 -2 OT of Bits . . . . . . . . . . . . . . . . . 30 vii 3.2.2 Randomized 1 -2 OT of Strings . . . . . . . . . . . . . . . 32 3.3 Characterizing Send er-Securit y . . . . . . . . . . . . . . . . . . . 32 3.3.1 The Case of Bit O T . . . . . . . . . . . . . . . . . . . . . 32 3.3.2 The Case of String OT . . . . . . . . . . . . . . . . . . . 33 3.4 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.4.1 Reducing 1 -2 OT ℓ to Rep etitions of W eak 1 -2 OT s . . . . 40 3.4.2 Reducing 1 -2 OT ℓ to One Execution of UO T . . . . . . . 42 3.4.3 Quant itativ e Comparisons T o Related W ork . . . . . . . . 45 3.5 Extension to 1 - n OT ℓ . . . . . . . . . . . . . . . . . . . . . . . . 46 3.6 1 -2 OT in a Quant um S etting . . . . . . . . . . . . . . . . . . . . 50 4 Quan tum Uncertain ty Relations 52 4.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 4.1.1 Op erators and Norms . . . . . . . . . . . . . . . . . . . . 52 4.1.2 Azuma’s Inequalit y . . . . . . . . . . . . . . . . . . . . . . 54 4.1.3 Mathematica l T o ols . . . . . . . . . . . . . . . . . . . . . 55 4.2 History and Previous W ork . . . . . . . . . . . . . . . . . . . . . 56 4.2.1 Mutually Unbiase d Bases . . . . . . . . . . . . . . . . . . 56 4.2.2 Uncertain t y Relations Using Shan n on E ntrop y . . . . . . 57 4.2.3 Higher-Order Entropic Un certain t y Relations . . . . . . . 58 4.3 Tw o Mutually Unbiased Bases . . . . . . . . . . . . . . . . . . . 59 4.4 More Mutually Unbiased Bases . . . . . . . . . . . . . . . . . . . 62 4.5 Indep endent Bases f or Eac h Su bsystem . . . . . . . . . . . . . . . 63 4.5.1 A Classical T o ol . . . . . . . . . . . . . . . . . . . . . . . 63 4.5.2 Quant um Uncertaint y Relations . . . . . . . . . . . . . . 65 4.5.3 The Ov erall Av erage Entropic Uncertaint y Bound . . . . 66 5 Rabin OT in the Bounded-Quan tum-Storage Mo del 69 5.1 The Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 5.2 The Proto col . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 5.3 Mo deling Dishonest Receiv ers . . . . . . . . . . . . . . . . . . . . 73 5.4 Securit y Against Dishonest Receiv ers . . . . . . . . . . . . . . . . 73 5.5 On the Necessit y of Priv acy Amplification . . . . . . . . . . . . . 74 5.6 W eak ening the Assu mptions . . . . . . . . . . . . . . . . . . . . . 75 5.6.1 W eak Q uan tum Mo del . . . . . . . . . . . . . . . . . . . . 76 5.7 Rabin OT of Strings . . . . . . . . . . . . . . . . . . . . . . . . . 78 6 1 -2 OT in the Bounded-Quantum-Storage Mo del 79 6.1 The Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 6.2 The Proto col . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 6.3 Securit y Against Dishonest Receiv ers . . . . . . . . . . . . . . . . 82 6.4 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 6.4.1 1 -2 OT ℓ with Longer Strings . . . . . . . . . . . . . . . . 84 6.4.2 W eak ening the Assu mptions . . . . . . . . . . . . . . . . . 84 6.4.3 Rev ersing th e Quan tum Communicatio n . . . . . . . . . . 84 viii 7 Quan tum Bit Commitment 86 7.1 The Proto col . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 7.2 Mo deling Dishonest Committers . . . . . . . . . . . . . . . . . . 87 7.3 Defining the Binding Prop erty . . . . . . . . . . . . . . . . . . . 88 7.3.1 The “Standard” Binding Condition . . . . . . . . . . . . . 88 7.3.2 A Stronger Binding Cond ition . . . . . . . . . . . . . . . 88 7.4 W eak Bind ing of the Commitment Sc heme . . . . . . . . . . . . . 89 7.5 Strong Bindin g of the Commitmen t Scheme . . . . . . . . . . . . 90 7.6 W eak ening the Assu mptions . . . . . . . . . . . . . . . . . . . . . 91 8 QKD Against Bounded Eav esdroppers 94 8.1 Deriv ation of the Maximum T olerated Noise L ev el . . . . . . . . 94 8.2 The Binary-Channel Setting . . . . . . . . . . . . . . . . . . . . . 96 8.3 P ossible E x tens ions . . . . . . . . . . . . . . . . . . . . . . . . . . 97 9 Conclusion 98 9.1 T ow ard s Practice . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 9.1.1 More Imp er f ections . . . . . . . . . . . . . . . . . . . . . . 98 9.1.2 Generalizing the Memory Mod el . . . . . . . . . . . . . . 99 9.2 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Notation 102 Bibliograph y 1 04 Index 117 ix Chapter 1 In tro duction In the quest for in teresting cryptographic mo dels, boun ding the quantum mem- ory of adv ersarial play ers is a great assu mption. 1.1 Cryptographic Mo dels and Basic Primitiv es It is a fascinating art to come u p with pr oto c ols 1 that ac hiev e a cryptographic task like encryption, authen tication, iden tification, v oting, secure fun ction ev al- uation to name just a famous few. T o define a notion of securit y f or suc h proto- cols, one needs to sp ecify a crypto gr aphic mo del , i.e. an environmen t in w hic h the proto col is ru n. The mo del states for example the num b er of honest and dishonest play ers, the allo we d ru n ning time and amount of memory a v ailable to h onest and dishonest pla y ers, h o w d ishonest p la y ers are allo we d to d eviate from the proto col, the use of external r esources like (quan tum) communicatio n c hannels or other already established cryptographic fu nctionalities etc. While coming u p with more and more proto cols for differen t mo d els, cryp- tographers r ealized that some basic primitives (i.e. precisely d efined crypto- graphic tasks) are u seful as “b enc hmarks” of ho w p ow erful a particular cryp- tographic mo del is. An example is the tw o-part y p r imitiv e Oblivious T r ansfer ( OT ). It comes in different fla v ors, but all of these v ariants are equiv alen t in th e sense that an y one of them can b e implement ed using (p ossibly sev eral instances of ) an other. The one-out- of- two v ariant 1 -2 OT was originally int ro d u ced by Wiesner around 1970 (b ut only publish ed m uc h later in [Wie83]) in the very first pap er ab out qu an tum cryptography , and later redisco v ered by Eve n, Goldreic h, and Lemp el [EGL82]. It lets a sender Alice tran s mit t w o bits to a receiv er Bob who can c ho ose wh ic h of them to r eceiv e. A secure implement ation of 1 -2 OT do es not allo w a dishonest sender to learn wh ic h of the t w o bits w as receiv ed and it do es not allo w a d ishonest r eceiv er to learn an y information ab out the second b it. It was a surp r ising insigh t w h en Kilian sh o w ed that this simple primitiv e is c omplete for t w o-part y cry p tograph y [K il88]. In other words, a mo del in which 1 -2 OT can b e securely implemented allo ws to implemen t an y cryptographic fu nctionalit y b et we en t w o pla y ers 2 . Another v arian t we are con- 1 A p rotocol consists of clear-cut instructions fo r the p articipating p laye rs. 2 If th e m o del can b e reasonably extend ed to more play ers, this usually allo ws to implement 1 1.1. Cr yptogra phic Models and Bas ic Primitives 2 cerned w ith in this thesis wa s in tro duced b y Rabin [Rab81] and is hence called Rabin Oblivious T ransfer ( Rabin OT ). It is basically a “secure erasure c han- nel”: the sender Alice send s a bit whic h w ith probability one half is absorb ed and with probabilit y one half fin d s its wa y to the receiv er Bob. Th e securit y requirement s are the follo wing: whatev er a dish on est Alice do es, she cannot find out whether the bit wa s receiv ed or n ot; and whatev er a dishonest receiv er do es, he do es not get an y information ab out the bit with pr obabilit y one half. Y et another b asic t wo -part y pr imitiv e of int erest is Bit C ommitmen t ( BC ) whic h allo ws a play er to commit himself to a c hoice of a bit b b y comm unicat- ing with a v erifier. The ve rifier should n ot learn b (w e sa y the commitmen t is hiding ), y et the committer can later c ho ose to r ev eal b in a convincing w a y , i.e. only the v alue fixed at commitmen t time will b e accepted by the verifier (w e sa y the commitmen t is binding ). Bit Commitmen t is a fundamenta l bu ilding blo c k of virtually ev ery more complicated cryptographic proto col. Imp lement- ing secure BC with a secur e 1 -2 OT at hand is not d iffi cu lt 3 . On the other hand, there are cryptographic mo dels allo wing to s ecurely imp lemen t BC , bu t not 1 -2 OT . Mo ran and Naor ga ve an example of suc h a mo del b y assuming the physic al device of a tamp er-pro of seal [MN05]. It is n ot hard to see that the t w o sec urity r equirement s for BC are in a sense con tradictory , so p erf ectly secure bit commitment cannot b e im p lemen ted “from scratc h”, that is if only error-free comm unication is a v aila ble and ther e is no limitation assumed on the computing p o we r and memory of the pla y ers. T he informal reason for this is that th e hiding prop erty imp lies that when 0 is com- mitted to, exactly the same information exchange could hav e happ ened when committing to 1. Hence, ev en if 0 w as actually committed to, the committer could alwa ys compute a complete view of the proto col consistent w ith ha ving committed to 1, and pretend that this view was what he h ad in mind origi- nally . By the reduction of BC to 1 -2 OT follo ws that also 1 -2 OT and many other cryptographic f u nctionalities cannot b e p erfectly secure wh en built from scratc h. One migh t hop e that allo wing the protocol to mak e u se of q u an tum com- m unication would mak e a difference. Here, information is stored in qubits, i.e., in th e state of t wo -lev el quant um mechanica l sys tems, su c h as the p olarization state of a s ingle photon. Quan tum information b eh a v es in a wa y that is f un- damen tally different fr om classical inform ation, enabling, f or ins tance, u n con- ditionally secure k ey exc hange b et w een tw o honest pla y ers (so-called Qu antum Key Distribution ). Ho wev er, in the case of tw o m utually distrusting parties, w e are not so fortun ate: ev en with quantum communicatio n, u nconditionally secure BC a nd 1 -2 OT remain imp ossible. Th is is the infamous imp ossibilit y result b y May er s and by Lo and Chau [Ma y97, LC97]. F or this reason, cryp tographers ha v e tried hard to exhibit more r estricted mo dels where these imp ossibility r esu lts do not apply . The high art in this pr o- secure m ulti-party protocols as well. 3 T o commit to a bit b , the committer sends random bits of p arit y b v ia ( sever al instances of ) 1 -2 OT and t he v erifier pic ks randomly one of the b its. T o open, the committer send s al l the random bits h e wa s u sing, t h e ve rifier chec ks whether t hese are consistent with what he receiv ed. 1.2. Classical Bounded-Stor ag e Model 3 cess is to find assu mptions that are as rea listic as possib le – thus only minimally restricting the mo d el, bu t still strong enough to allo w for imp lemen ting inter- esting functionalities. Th er e are at least three kinds of p ossible assumptions, namely • b oundin g the computing p o we r of p la y ers, • using the noise in th e communicatio n c hannel, • exploiting some physical limitation of the adv ersary , e.g., if th e size of th e a v ailable memory is b ound ed. The first scenario is the basis of man y well known s olutions based on plau- sible but un p ro v en complexit y assumptions, su c h as hardn ess of factoring or discrete logarithms. A term often used for suc h sc hemes is “computational se- curit y”, meaning that it is not imp ossible for an adversary to b ehav e dish onestly , but it is c omputational ly infe asible f or him to do so. S ecurit y pro ofs are usually done b y reduction in the sense that breaking the securit y of the proto col would imply solving a h ard problem lik e factoring the pro duct of tw o large prime num- b ers. T he second scenario has b een used to constru ct b oth BC and OT p roto- cols in v arious models for the noise b y Cr ´ ep eau, Kilian, Damg ˚ ard , Salv ail, F ehr, Morozo v, W olf, and W ullschleg er [CK88, DKS 99, DFMS04, CMW04, W u l07 ]. The third scenario is the fo cus of this thesis. In con trast to the fi rst scenario, w e deal with “un cond itional securit y” wh ere (dep ending on the task a p roto col aims to ac hiev e) an adv ersary has no wa y wh atso ever to gain illegal information. Pro ofs are not done b y reduction, bu t we can pro v e in information-theoretic terms that except with negligible probab ility , the adversary do es not learn any information th at is meant to remain secret. 1.2 Classical Bounded-Storage Mo del In the classical b ound ed -storage mo del, we assume the play er s to u se classical error-free communicatio n an d to b e computationally u n b oun ded, but on the other hand r estrict the size of their memory . I n th e usual setting, there is a large random source R (often called the r and omizer ) which all p la y ers can access, but wh ic h is to o large (or transmitted to o quic kly) to store as a whole. One can think of R as a d eep-space r adio source or a satellite broadcasting random bits at a very high r ate. When Maurer in tro duced the classical b ounded -storage mo d el in [Mau90], the goal w as se cu r e message tr ansmission . He sh o w ed that t w o honest p arties Alice and Bob sharing an initial key can expand that k ey unless the ea ve sdrop - p er Eve can store more than a large fr action of the r andomizer. Th e basic idea of the tec hnique allo wing Alice and Bob to get an adv an tage ov er Eve is that their initial secret key indexes some p ositions in th e randomizer ab out whic h Ev e has some uncertain t y if she cannot store the whole randomizer. Therefore, the bits at these p ositions can b e com bined to yield more secure key bits and so to expand the initial k ey . 1.3. Contributions 4 A line of sub sequen t wo rk by Maurer, Cachin, Aumann , Ding, Rabin, Dziem b o wski, Lu, and V adhan [Mau92, CM97, ADR02, DM04 , Lu04, V ad04] impro v ed th is original proto col in terms of efficiency and s ecur it y . Aumann, Ding and R ab in [ADR02] noticed that pr otocols in this mo del enjoy the pr op- ert y of “eve rlasting securit y” in the sense that the newly generated key re- mains secure even when the initial key is later reveal ed and E v e is no longer memory-b ound ed, u n der the sole condition that the origi nal randomizer ca nnot b e accessed any more. Ding [Din05 ] sho wed ho w to d o error correction in the b ound ed-storage mo del and th er efore how to cop e with the situation when the honest parties do not h a v e exactly th e same view on the randomizer. Cac hin, Cr ´ ep eau and Marcil illustrated the p o w er of the b ound ed -storage mo del by exhibiting in [CCM98] a pr otocol f or 1 -2 O T . Ding improv ed on this [Din01a] and later sho w ed a constan t-round proto col f or oblivious transfer in join t wo rk with Harnik, Rosen and Shaltiel [DHRS04]. All these protocols are sh o wn secure as long as the adversary’s memory s ize is at most quadratic in the memory size of the honest play ers. Considering the ease and lo w cost of storing massive amounts of classical data no wa da ys, it is questionable h o w pr actica l suc h an assumption on the memory size of the pla y ers is. It w ould b e clearly m ore satisfact ory to ha v e a larger than quad r atic separation b et we en the memory size of honest p lay ers and that of the adve rsary . Ho w ev er, this was sh o wn to b e imp ossible by Dziem b o wski and Maurer [DM04]. 1.3 Con tributions In this section, we giv e an ov er v iew of the con tributions of th is thesis. The results ab out classical oblivious transfer describ ed in Ch ap ter 3 and su mmarized in Section 1.3.2 are join t work with Damg ˚ ard, F ehr and Salv ail [DFSS06 ]. All other results are based on t w o p ap ers co-authored with Damg ˚ ard , F eh r, S alv ail and Renner: [DFSS05] and [DFR + 07]. A j ournal ve rsion of [DFSS05] is to app ear in a sp ecial issue of the SIAM Jour nal of Computing [DFSS08]. 1.3.1 Bounded-Quan tum-Storage Mo del In this thesis, we stu d y for the first time proto cols wh ere quantum comm uni- cation is u sed and w e place a b ound on the adversary’s quantum memory size. There are t w o reasons w h y this may b e a go o d idea: fir st, if we do not b oun d the classical memory size, we a v oid the imp ossibilit y resu lt of [DM04]. Second, the adv ersary’s t ypical goal is to obtain a certain piece of cla ssical inf ormation th at w e wa nt to k eep hidden from him. Ho w ev er, if he cannot store all the quantum information that is sent, he must con ve rt s ome of it to classical information by measuring. Th is m a y irreversibly destroy information, and w e m a y b e able to arrange it in suc h a w a y that the adv ersary cannot afford to lose information this w a y , while h onest pla y ers can. It turn s out that th is can b e ac hiev ed indeed: we present pr otocols for b oth BC and O T in wh ic h n qub its are transm itted, wh ere honest pla y ers need no qu antum memory , but where the adv ersary m ust store at least a large fraction (t ypically n/ 2 or n / 4) of the n transmitted qu bits to break th e proto col. 1.3. Contributions 5 W e emphasize that no b ound is assumed on th e adv ersary’s computing p o w er, nor on his classica l memory . Th is is clearly muc h more satisfactory th an the classical case, not only from a theoretical p oin t of view, but also in practice: while sendin g qubits and m easur ing them immed iately as they arriv e is w ell within reac h of current tec hnology , storing eve n a single qubit for more than a fraction of a second is a f ormidable tec hnologica l c hallenge. F urther m ore, w e show that our p roto cols also w ork in a non-ideal setting where w e allo w the q u an tum sour ce to b e imp erf ect and the quantum com- m unication to b e noisy . W e emphasize that w hat m ak es OT and BC p ossible in our m o del is not so muc h the memory b ound p er se, but rather the loss of information on th e part of th e adv ersary . Ind eed, our r esults also h old if th e ad- v ersary’s memory device holds an arbitrary num b er of qubits, bu t is imp erfect in certain w a ys. All these factors mak e th e assumption of b ounded quan tum memory a very attractiv e cr y p tographic mo del. On one hand, as for the classical b ounded- storage mod el, it is simp le to w ork with and yields b eautiful theoretical results. On the other hand, it is m uc h more reasonable to assu me the d ifficult y of storing quan tum information compared to storing classical one and hence, w e are v ery close to the ph ysical realit y and get sc hemes that can actually b e implemen ted! 1.3.2 Characterization of Securit y of Classical 1 -2 OT While the task of formally defin in g unconditional securit y of classical pr otocols for Rabin OT and BC is w ell und ersto o d, capturing the s ecur it y of 1 -2 OT in information-theoretic terms is consid er ab ly more d elicate, as was p oint ed out b y Cr´ ep eau, S a vvides, Sc haffner and W ullschleg er [CSS W06]. F or 1 -2 O T of bits, it is clear that th e security for a h onest send er against a c heating receiv er guaran tees that the r eceiv er d o es not learn any inf ormation ab out the X OR of the t w o bits. Somewhat sur prisingly , the con v erse is true as well, not having an y information ab out the X OR of the t w o bits sent implies that we can p oin t at one bit which the d ishonest receiv er d o es not kno w (giv en th e other). This idea can b e generalized to 1 -2 OT of strings wher e the ignorance of the X OR b ecomes ignorance of the ou tcome of all Non-Degenerat e Linear binary F unctions (NDLFs) app lied to the t w o strings sen t. Su ch a c haracterization of send er-securit y in terms of NDLF comp oses w ell w ith str ongly two-universal hashing and hereby yields a p o w erful tec hnique to impr o v e the analyses of the standard redu ctions f r om 1 -2 OT to weak er v arian ts of OT . As a historical sid e note, the original motiv ation for this classical c harac- terizatio n was the h op e that it tr anslates to the qu an tum setting and thereb y yields a security pro of of the 1 -2 O T sc heme in the b ounded-quantum-storage mo del. W e will p oint out why th is approac h do es not w ork. 1.3.3 Quan tum Securit y Definitions and Proto cols When th e pla y ers are allo we d to use quan tum comm unication, the output of a dish onest play er is a quantum state ev en when the pr otocol implements a classical primitiv e. Th erefore, securit y defin itions for Rabin OT , 1 -2 OT and 1.3. Contributions 6 BC h av e to b e phrased in qu antum terms. As an easy-to-use comp osabilit y framew ork has not y et b een established for quantum proto cols 4 , v arious ad- ho c security requiremen ts are commonly u sed. Th e definitions in this thesis are th e strongest so far pr op osed, and as they are based on the (cla ssical) considerations in [CSSW06], w e b eliev e that they are b est suited to provi de se qu ential c omp osa bility . Most of the present ed protocols in th e b ounded-quantum-storage mo d el can b e cast in a n on-in teractiv e form, i.e. only one party sends information when doing OT , commitmen t or op ening. W e sho w the follo wing. OT in the Bounde d-Quantum-Stor age M o del: Ther e exist non-inter active pr oto c ols for Rabin OT and 1-out-of-2 Oblivious T r ansfer ( 1 -2 OT ) of ℓ -bit mes- sages, se cur e in the b ounde d-quantum-stor age mo del against adversaries with quantum-memory size at most n / 2 − ℓ for Rabin OT and n / 4 − 2 ℓ for 1 -2 OT . Her e , n i s the numb er of qubits tr ansmitte d in the pr oto c ol and ℓ c an b e a c on- stant fr actio n of n . Honest players ne e d no quantum memory at al l. F or the case of bit commitmen t, the standard definition of the binding prop erty used in the quant um setting wa s introd uced by Dumais, Ma y ers and Salv ail [DMS00 ]. F or b ∈ { 0 , 1 } , let p b denote the p robabilit y that a dishonest committer successfully op ens the commitmen t to v alue b . The bind in g condition then requires that the su m of p 0 and p 1 do es essentia lly not exceed 1. More formally , p 0 + p 1 ≤ 1 + ne gl ( n ) w here ne gl ( n ) stands for a term wh ic h is negligible in n such as 2 − cn (for a constan t c > 0) which is exp onen tially small in n . This is to capture that a quantum committer can alw a ys commit to the v alues 0 and 1 in su p erp osition. W e call this notion we akly binding in the follo wing. A shortcoming of th is n otion is that committing bit b y bit is n ot guaranteed to yield a secure string commitment —the argument that one is tempted to use requires ind ep endence of th e p b ’s b et w een the different executions, w hic h in general do es not hold. Instead, we p r op ose the follo wing str ong binding condition: Af ter the com- mitmen t phase, ther e exists a binary random v ariable D ∈ { 0 , 1 } such that a dishonest committer cannot op en the commitmen t to v alue D except with neg- ligible probabilit y . The p oin t is that the distribution of D is not un der con trol of the dishonest committer. W e will p oint out that using this defin ition, we can easily derive th e securit y of a strin g commitmen t from the securit y of the individual bits. BC in the Bounde d-Quantum-Stor age Mo del: Ther e exists a pr oto c ol for bit c ommitment which is non-inter active. It is p erfe ctly hiding and we akly binding in the b ounde d-quantum-stor age mo del against dishonest c ommitters with quantum-memory size at most n/ 2 . It is str ongly binding against memory sizes of at most n/ 4 . Her e, n is the numb er of qub i ts tr ansmitte d in the pr oto c ol. Honest players ne e d no quantum memory at al l. F urther m ore, th e commitment pr otocol h as the int eresting p rop erty that the only message is sen t to the committer, i.e., it is p ossible to commit while 4 Some rather complicated framew orks are known. They ha ve b een pu t forward by Ben- Or and May ers [BM0 4 ] and Unru h [Unr02]. 1.3. Contributions 7 only r e c e iving information. Suc h a sc heme clea rly do es not exist without a b ound on the committ er’s memory , ev en under compu tational assumptions and using quantum comm unication: a corrupt committer could alw a ys store (p os- sibly quan tumly) all the inform ation sen t, until op ening time, and only then follo w the honest committer’s algo rithm to figure out what should b e sen t to con vincingly op en a 0 or a 1. Note that in the classical b ound ed-storage mo d el, it h as b een shown by Moran, Shaltiel and T a-Shma [MST04] ho w to do time-stamping that is non- in teractiv e in our sense: a pla y er can time-st amp a docum en t while only receiv- ing information. Ho we ve r, no reasonable proto col f or BC or for time-stamping a s ingle b it exists in this mo del. It is straight forward to see that an y suc h pro- to col can b e brok en b y an adv ersary with classical memory of size t wice that of an honest pla y er, while our p roto col r equires no quan tum memory f or the honest pla y ers and remains secure against any adv ersary unable to store more than half the size of th e quan tum transmission. W e also note th at it has b een sho wn earlier b y Salv ail [S al98] that BC is p ossible using quan tum comm unication, assuming a different t yp e of physica l limitation, namely a b ound on the size of coheren t measurement that can b e implemen ted. Th is limitation is incomparable to our s: it do es not limit the total s ize of the memory , instead it limits the n umber of bits that can b e si- m ultaneously op er ated on to pro du ce a classical result. Our adversary has a limit on the total quan tum memory size, but can measure all of it coherent ly . The proto col f rom [Sal98] is in teractiv e, and r equires a b ound on the m aximal measuremen t size that is sub-linear in n . 1.3.4 Quan tum Uncertain t y Relations A problem often encountered in qu an tum cryp tograph y is the follo wing: through some in teraction b et w een the pla y ers, a quan tum state is generated and then measured b y one of the p la y ers (we call her Alice in the follo wing). Assuming Alice is h onest, we w an t to know ho w un p redictable her measurement outcome is to the ad versary . Once a lo w er b ound on the adve rsary’s uncertain t y ab out Alice’s measurement outcome is established, it is usually easy to p ro v e the d e- sired securit y p rop erty of the proto col. Man y existing constructions in qu an tum cryptograph y h a v e b een p r o v en secure follo wing this paradigm. T ypically , Alice d o es not mak e her measurement in a fixed basis, bu t chooses at random from a set of different bases. Th ese bases are u sually c hosen to b e pairwise mutual ly unbi ase d , meaning that if the qu an tum state is suc h that the measuremen t outcome in one basis is fixed, then this implies that the uncer- tain t y ab ou t the outcome of the measur ement in th e other basis is maximal. In this w a y , one hop es to ke ep the adv ersary’s un certain t y high, ev en if the state is (partially) u nder the adv ersary’s control . An inequalit y that lo w er b oun d s th e adversary’s un certaint y in suc h a sce- nario is called an unc e rtainty r elation . There exist uncertaint y relations for differen t measures of u ncertain t y but cryptographic app lications typical ly re- quire the adversary’s min-en trop y to b e b ound ed from b elo w. Su ch u n certain t y relations are the k ey ingredient in the s ecur it y pro ofs of our pr otocols in the 1.3. Contributions 8 b ound ed-quan tum-storage mo del. In this thesis, we in tro du ce new general and tight high-ord er entropic un- certain t y relations. S ince th e relations are expr essed in terms of low er b ound s on the min-entrop y or upp er-b ou n ds on large probabilities r esp ectiv ely , they are applicable to a large class of natural pr oto cols in qu an tum cryptography . The first u ncertain t y relation is concerned with the situation wh ere a n -qub it state ρ is measured in one o ut of t w o m utually un biased bases, sa y either in the computational basis (the +-b asis) or in the diagonal basis (the × -basis). First Unc ertainty R elation: L et ρ b e an arbitr ary state of n qubits, and let Q + ( · ) and Q × ( · ) b e the r esp e ctive pr ob ability distributions over { 0 , 1 } n of the outc ome when ρ is me asur e d in the + -b asis r esp e ctively the × -b asis. Then, for any two sets L + ⊂ { 0 , 1 } n and L × ⊂ { 0 , 1 } n it holds that Q + ( L + ) + Q × ( L × ) ≤ 1 + 2 − n/ 2 p | L + || L × | . Another uncertaint y relatio n is derived for situat ions where an n -qub it state ρ has eac h of its qub its measured in a r an d om and ind ep endent basis sampled uniformly f r om a fixed set B of bases. B do es not necessarily ha v e to b e m utu- ally un biased, but we assume a lo w er b ound h —the so-called aver age entr opic unc e rtainty b ound —on the a v erage Shannon en trop y of th e distrib ution P ϑ , ob- tained b y measuring an arbitrary one-qubit state in basis ϑ ∈ B , meaning that 1 |B | P ϑ H( P ϑ ) ≥ h . Se c ond Unc ertainty R elation (informal): L et B b e a set of b ases with an aver age entr opic unc ertainty b ound h as ab ove. L et P θ denote the pr ob ability distribution define d by me asuring an arbitr ar y n -qubit state ρ in b asis θ ∈ B n . F or a uni f orm choic e Θ ∈ R B n , it hold s exc ept with ne gligible pr ob ability (over Θ and over P θ ) that H ∞ ( P θ | Θ = θ ) & nh. (1.1) Observe th at (1.1) cannot b e imp r o v ed signifi can tly since the min-entrop y of a distr ibution is at most equal to the Shannon en tropy . Our uncertain t y relation is therefore asymp toticall y tigh t w hen the b oun d h is tight. An y lo we r b ound on the Shann on entrop y asso ciated to a set of measure- men ts B can b e u s ed in (1.1 ). In the sp ecial case where the set of bases is B = { + , ×} (i.e. the tw o BB84 bases named after Bennett and Brassard who used them in the first quan tum-k ey-distribution pr oto col [BB84]), h is kno wn precisely us ing Maassen and Uffink’s entropic relation [MU88], see (4.2 ). W e get h = 1 2 and (1.1) results in H ∞ ( P θ | Θ = θ ) & n 2 . Uncertain t y relations for the BB84 co ding scheme are useful, since this cod ing is widely used in quan- tum cryptography . Its resilience to imp erfect qu an tum c hann els, s ou r ces, and detectors is an imp ortan t adv an tage in practice. A ma jor difference b et w een the first and second uncertaint y relation is that while b oth relations can b e u sed to b ound the min -en trop y conditioned on an ev en t, this ev en t h app ens in the latter case with probabilit y essenti ally 1 (on a v erage) whereas the corr esp ondin g ev en t from the first r elation (defin ed in Corollary 4.17) only h ap p ens w ith probabilit y ab out 1 / 2. 1.3. Contributions 9 1.3.5 QKD against Quan tum-Memory-Bounded Eav esdropper W e illustrate the v ersatilit y of our seco nd uncertain t y relation by applying it to Quant um-Key-Distribution ( QKD ) settings. Q KD is the art of distributing a secret key b et we en t wo distan t parties, Alice and Bob, u sing only a completely insecure quan tum c hann el and authent ic classical communicatio n. QKD p ro- to cols typical ly provide unconditional securit y , i.e., eve n an adve rsary with un - limited resources cannot get an y inform ation ab out the k ey . A ma jor difficulty when implement ing QK D sc hemes is that they require a lo w-noise quantum c hannel. Th e tolerated noise lev el dep end s on the actual proto col and on the desired security of the k ey . Because the qualit y of the c hannel t ypically de- creases with its length, the m axim um tolerate d noise level is an imp ortan t parameter limiting the m aximum d istance b etw een Alice and Bob. W e consider a mo d el in whic h th e adversary has a limited amoun t of quan- tum memory to store the information she in tercepts d uring the proto col execu- tion. In this mo del, we sh o w th at the maximum tolerated n oise lev el is larger than in the standard sce nario where the adve rsary has unlimited r esour ces. F or one-way QKD pr oto c ols whic h are proto cols wh ere error-correction is p erf orm ed non-in teractiv ely (i.e., a single classical message is sen t from one party to the other), w e sh ow the follo wing result: QKD A gainst Quantum-Memory-Bounde d E avesdr o pp ers: L et B b e a set of orthonormal b ases of the two-dimensiona l Hilb ert sp ac e H 2 with aver age entr opic unc ertainty b ound h . Then, a one-wa y QKD -proto col pr o duc es a se- cur e key against e avesdr opp ers whose qu antum-memory size is subline ar in the length of the r aw key at a p ositive r ate, as long as the bit-flip pr ob ability p of the quantum channel fulfil ls h ( p ) < h wher e h ( · ) denotes the binary Shannon- entr opy fu nction. Although this resu lt do es not allo w us to improv e (compared to unb ound ed adv ersaries) the maxim um error-rate for the BB84 p roto col (the 4-state pr oto- col), the 6-state (using three mutually unbiased bases) p roto col can b e sho wn secure against adversaries with memory b ound sublin ear in the secret-k ey length as long as the b it-flip error-rate is less than 17%. This impr o v es o v er th e maxi- mal error-rate of 13% for th is proto col agai nst unbou n ded adversaries. W e also sho w that the generalizat ion of th e 6-state proto col to more bases (not n eces- sarily m utually un biased) can b e s ho wn secure for a m aximal error-rate up to 20% pro vided the num b er of bases is large enough. Note that the b est kno wn one-w a y proto col based on qubits is p ro v en secure against general attac ks for an err or-r ate of only up to roughly 14 . 1%, and th e theoretical maximum is 16 . 3% [R GK05]. The quantum-memory-b ounded ea v esdropp er mo del studied here is not comparable to other r estrictions on adversaries considered in the literature (e.g. individual attacks , w here the ea v esdropp er is assumed to apply ind ep en- den t m easuremen ts to eac h qu bit sent o ve r th e quantum c hannel as considered b y F uc hs, Gisin, Griffiths, Niu, P eres, and L ¨ utkenhaus [F GG + 97, L ¨ ut00]). In fact, th ese assumptions are generally artificial and their purp ose is to simplify securit y pro ofs rather than to relax the conditions on the qualit y of the com- 1.4. Outline o f t he Thesis 10 m unication channel from wh ic h secure k ey can b e generated. W e b eliev e that the quantum-memory-b ounded eav esd ropp er m o del is more realistic. 1.4 Outline of the Thesis In Chap ter 2, w e int ro d uce notation and presen t some b asic concepts fr om probabilit y and quan tum information theory lik e quant um states and v arious kinds of their en tropies. W e prepare the stage b y repro du cing and sligh tly extending th e results ab out pr iv acy amplification via t wo -universal hashing from Renner’s PhD thesis [Ren05]. Chapter 3 is the on ly (almost) exclusiv ely classical chapter. It introd uces the different fla v ors of oblivious tr ansfer and giv es a c haracterization of the securit y for the sender of 1 -2 OT in terms of non-degenerate linear fun ctions. It is cast in a stand-alone m an n er and the rest of the thesis can b e un dersto o d without reading this chapter. In Chapter 4, the basis for the secur ity pro ofs of the follo wing c hapters is laid b y establishing the quantum min-entropic uncertain t y relations. T he f ol- lo wing Chapters 5 and 6 con tain th e quan tum definitions, pr otocols and secu- rit y pro ofs for Rabin OT and 1 -2 O T , resp ectiv ely . Chapter 7 treats quant um bit commitmen t. Tw o flav ors of the “binding pr op ert y” are defin ed and the tec hniques from the tw o previous chapters are us ed to pr o v e securit y in th e b ound ed-quan tum-storage mo del. Chapter 8 is dev oted to another app licatio n of the (seco nd) uncertain t y relation, quantum k ey distr ibution against a quan tum-memory-b ounded ea v es- dropp er. Th e last Ch apter 9 add resses some practical issues in greater detail and concludes. A sh ort summary of the notation, the b ibliograph y and an index can b e found at the end of the thesis. 1.5 Related W ork The classical b ounded-storage mo d el is d escrib ed in Section 1.2. Besides w ork p ointe d out in the ov erv iew of the con tributions in Section 1.3 ab o v e, it is w orth men tioning that seve ral pr otocols aiming at ac hieving quantum obliv- ious trans f er h a v e b een prop osed. After Wiesner’s original conjugate-codin g proto col [Wie83], Bennett, Brassard, C r ´ ep eau, and S kubiszewsk a prop osed an in teractiv e proto col for 1 -2 OT [BBCS91], whose secur it y w as sub sequen tly an- alyzed b y Cr´ ep eau [Cr´ e94], Ma y ers, Salv ail [MS94, Ma y95 ], and Y ao [Y ao95]. The proto col from [BBCS91] is in teractiv e and can b e easily b rok en by a dis- honest receiv er with unboun ded quant um memory . T o ensure that the re- ceiv er actually p erforms a measur emen t, it w as s uggested to use (quantum) bit-commitmen t sc hemes such as [BCJL 93 ] whic h were b eliev ed to b e secure against su ch adv ersaries at this p oin t in time. After the imp ossibilit y pro ofs of quan tum bit-commitmen t by Lo and Ch au [LC 97], and Ma y ers [Ma y97 ], and of oblivious transf er b y Lo [Lo97], it b ecame clear that assu mptions are neces- sary in order to securely r ealize these prim itives. Compared to these p r evious 1.5. Rela ted Work 11 attempts, the protocols in this th esis are simpler, non-interact iv e, and pro v ably secure according to stronger security definitions. W ork related to classical OT-reductions is referr ed to in the in tro ductory sections to Chapter 3 in Sections 3.1 and 3.4.1. Pr evious w ork ab out quant um uncertain t y relations is describ ed in Section 4.2. Chapter 2 Prelim i naries In this chapter, w e intro d uce notatio n and basic concepts used thr oughout the rest of the th esis. In addition, most of the follo wing c hapters ha v e an individual preliminary section in tro du cing co ncepts that are exclusiv ely used in those sp ecific c hapters. This c hapter do es not give a thorough in tro du ction to probabilit y theory , information theory and qu an tum information pro cessing, but w e rather assu me the reader familiar with the basic concepts from the stand ard literature like [CT91, NC 00 ]. Instead, w e giv e a sp ecific ov er v iew of the concepts whic h are required for un derstanding this thesis. 2.1 Notation and Basic T o ols F or a sequence of v ariables x 1 , . . . , x n , we use the abb reviation x i : = x 1 , . . . , x i for the collectio n of v ariables up to index i , and we define x 0 : = ∅ to b e the empt y string. F or a set I = { i 1 , i 2 , . . . , i ℓ } ⊆ { 1 , . . . , n } an d a n -b it string x ∈ { 0 , 1 } n , we define x | I : = x i 1 x i 2 · · · x i ℓ . It is sometimes conv enien t that all substrings of this form ha v e the same length, irresp ectiv e of the actual size ℓ of the ind ex s et I . Therefore, we defin e the n -b it string x | ◦ I : = x i 1 x i 2 · · · x i ℓ 0 · · · 0 to b e the original substring padded with n − ℓ zeros. Most logarithms in this thesis are w ith r esp ect to base 2 and d enoted by log( · ). Ho wev er, when n eeded, ln( · ) denotes the natural logarithm to base e . W e w rite B δn ( x ) for the ball of all n -bit strings at Hamming distance at most δn fr om x . Note that the num b er of elemen ts in B δn ( x ) is the same for all x , we denote it by B δn : = | B δn ( x ) | . It is w ell known that B δn ≤ 2 nh ( δ ) , where h ( p ) : = −  p · log p + (1 − p ) · log (1 − p )  is the binary entrop y function. W e d enote by ne gl ( n ) an y function of n s m aller than the in v erse of any p olynomial pr o vided n is sufficient ly large. If w e wa nt to choose tw o symb ols + or × according to the bit b ∈ { 0 , 1 } , 12 2.2. Probability Theor y 13 w e write [+ , × ] b . The Kroneck er delta function is d efined as δ i,j =  1 if i = j, 0 if i 6 = j. The indicator rand om v ariable 1 E equals 1, if the even t E o ccurs and 0 else. Definition 2.1 (con v ex/conca v e function) A fu nction f : R → R is con- v ex on the i nterval [ a, b ] , if for any two p oints x, y ∈ [ a, b ] and 0 ≤ s ≤ 1 , it holds that f ( sx + (1 − s ) y ) ≤ sf ( x ) + (1 − s ) f ( y ) . Ana lo gously, the function is conca v e on [ a, b ] , if f ( sx + (1 − s ) y ) ≥ sf ( x ) + (1 − s ) f ( y ) . Lemma 2.2 ( Jensen’s inequalit y) L et f : R → R b e a c onvex function on R and let x 1 , . . . , x n ∈ R . L et p 1 , . . . , p n ∈ [0 , 1] b e such that P i p i = 1 . Then, f n X i =1 p i x i ! ≤ n X i =1 p i f ( x i ) . F or x 1 = x 2 = . . . = x n , e quality holds. Lemma 2.3 ( Cauc h y-Sc h warz inquality) F or r e al numb ers x 1 , . . . , x n and y 1 , . . . , y n , the fol lowing holds n X i =1 x i · y i ! 2 ≤ n X i =1 x 2 i ! · n X i =1 y 2 i ! . Pro of: Note that P n i =1 ( x i · z + y i ) 2 is a quadratic p olynomial a · z 2 + bz + c without real ro ots unless all x i /y i are equal. Therefore, its discriminant b 2 − 4 ac is non-p ositiv e: 4 n X i =1 x i · y i ! 2 − 4 n X i =1 x 2 i ! · n X i =1 y 2 i ! ≤ 0 .  2.2 Probabilit y Theory F or a discrete probabilit y space (Ω , P ), we write P [ E ] for the p robabilit y of the even t E ⊂ Ω, and we write P X for the distribution of the r andom v ariable X : Ω → X taking v alues in the fi nite set X . As is common pr actice, we d o not refer to the prob ab ility space (Ω , P ) bu t lea v e it imp licitly defined by the join t probabilities of all consid ered even ts and r andom v ariables. F or tw o random v ariables X and Y w ith joint distribution P X Y o v er X × Y , the conditional 2.2. Probability Theor y 14 probabilit y distribution of X given Y is defined as P X | Y ( x | y ) : = P X Y ( x,y ) P Y ( y ) for all x ∈ X and y ∈ Y with P Y ( y ) > 0. F or a probabilit y distribu tion Q ov er X , we abbreviate the (o v erall) probabilit y of a set L ⊆ X with Q ( L ) : = P x ∈ L Q ( x ). Let P and Q b e t w o p robabilit y distributions ov er the same finite d omain X . The variational distanc e 1 δ  P , Q  b et we en P and Q is defined as δ  P , Q  : = 1 2 X x ∈X   P ( x ) − Q ( x )   . Note th at this definition makes sense a lso for non-normalize d d istributions, and indeed we define an d use δ  P , Q  for arbitrary p ositiv e-v alued f unctions P and Q with common domain. In case X is of the form X = U × V , we can expan d δ  P , Q  to δ  P , Q  = P u δ  P ( u, · ) , Q ( u, · )  = P v δ  P ( · , v ) , Q ( · , v )  . W e write P ≈ ε Q to denote that P and Q are ε -close, i.e., that δ  P , Q  ≤ ε . By unif we denote a un iformly distribu ted b inary random v ariable indep en- den t of an ything else, suc h that P unif ( b ) = 1 2 for b oth b ∈ { 0 , 1 } , and unif ℓ stands for ℓ indep endent copies of unif . F or a random v ariable R o v er the reals R , its exp ected v alue is denoted b y E [ R ]. Lemma 2.4 ( Mark o v’s inequality ) F or a non-ne g ative r e al r andom v ariable X and ε > 0 , we have Pr  X ≥ E [ X ] ε  ≤ ε . Pro of: F or the ind icator function 1 E whic h equals 1 if the ev ent E o ccurs and 0 else, w e observe th at E [ X ] ε · 1 n X ≥ E [ X ] ε o ≤ X . T aking the exp ected v alues on b oth sides, using linearit y of the exp ectation an d rearranging the terms yields th e claim.  Lemma 2.5 ( Chernoff ’s inequality) L et X 1 , . . . , X n b e identic al ly and in- dep endently distribute d r andom variables with Bernoul li distribution, i.e. X i = 1 with pr ob ability p and X i = 0 with pr ob ability 1 − p . Then S : = P n i =1 X i has binomial distribution with p ar ameters ( n, p ) and it holds that P [ | S − pn | > εn ] ≤ 2 e − 2 ε 2 n . See [AS00] or [MP95] for a p ro of. 1 also ca lled statistic al or Kolmo gor ov distance 2.3. Quantum Informa t ion Theor y 15 2.3 Quan tum In formation Theory In this section, we give a v ery brief in tro duction to the quan tum notions w e u s e in this thesis, we r efer to [NC00, Ren05] for fur ther exp lanations. F or an y p ositiv e in teger d ∈ N , H d stands for the complex Hilb er t space of dimension d . Sometimes, w e omit the dimension a nd simply write H . The sta te of a quantum-mec h anical system in H is describ ed by a density op er ator ρ . A densit y op erator ρ is norm alized w ith resp ect to the trace norm (tr( ρ ) = 1), Hermitian ( ρ ∗ = ρ ) and has non-negativ e eigen v alues. P ( H ) d enotes the set of all density op er ato rs acti ng on H . 1 denotes the ident it y matrix (describing the fully mixed state) renorm alized by the appropriate dimension. A qu an tum state ρ ∈ P ( H ) is called pur e if it is of the form ρ = | ϕ i h ϕ | for a (normalized) v ector | ϕ i ∈ H . A p ositive op er ator-value d me asur ement (P OVM) is a family M = { E x } x ∈X of n on-negativ e op erators suc h th at P x ∈X E x equals the iden tit y matrix. The probabilit y d istribution P X obtained wh en app lying the POV M M to the quan - tum state ρ is defin ed as P X ( x ) : = tr( E x ρ ). The general ev olution (lik e u nitary transform s, measuremen ts, applying noise etc.) of a quantum system in state ρ can b e describ ed by a qu antum op er ation E ( ρ ), which is a completely p ositive and trace-preserving m ap, i.e. E is linear and maps non-negativ e normalized op erators ρ ∈ P ( H ) into non- negativ e n orm alized op erators E ( ρ ) ∈ P ( H ). The n otion of (v ariational) distance of tw o random v ariables can b e n atu- rally extended to the tr ac e distanc e b et we en t w o d ensit y op erators ρ, σ ∈ P ( H ) defined by δ  ρ, σ  : = 1 2 tr( | ρ − σ | ), wh ere we define | A | : = √ A ∗ A to b e the p ositiv e square-ro ot of A . As in the classical case, w e write ρ ≈ ε σ to denote that ρ and σ are ε -clo se, i.e. δ  ρ, σ  ≤ ε . The trace distance has an op erational meaning in that the v alue 1 2 + 1 2 δ  ρ, σ  is the a v erage success probability when distinguishing ρ f rom σ via a mea surement. In fact, the rela tion to the classical v ariational distance b ecomes eviden t in δ  ρ, σ  = max M δ  M ( ρ ) , M ( σ )  where the maximization is o v er all PO VMs M and M ( ρ ) refers to the probability dis- tribution ob tained when measuring ρ using M . Rus k ai [Rus94] sho we d that the trace d istance do es not increase und er (trace-preserving) quantum op erations, formally δ  ρ, σ  ≤ δ  E ( ρ ) , E ( σ )  for an y quant um op eration E . The pair {| 0 i , | 1 i} d enotes the computational or rectilinear or “+” basis for the 2-dimensional Hilb ert s pace H 2 . T he diagonal or “ × ” basis is defin ed as {| 0 i × , | 1 i × } where | 0 i × = ( | 0 i + | 1 i ) / √ 2 and | 1 i × = ( | 0 i − | 1 i ) / √ 2. T he circu- lar or “  ” basis consists of v ectors ( | 0 i + i | 1 i ) / √ 2 an d ( | 0 i − i | 1 i ) / √ 2. Mea- suring a qub it in the + -basis (resp. × -basis) means applying the m easuremen t describ ed b y pro j ectors | 0 i h 0 | and | 1 i h 1 | (resp . pro jectors | 0 i × h 0 | × and | 1 i × h 1 | × ). When the con text r equ ires it, w e write | 0 i + and | 1 i + instead of | 0 i resp ectiv ely | 1 i . F or a n -b it strin g x ∈ { 0 , 1 } n , | x i + stands for the state N n i =1 | x i i + ∈ H 2 n and analogous for | x i × . As mentio ned ab o v e, the behavior of a quan tum state in a registe r E is f ully describ ed b y its densit y matrix ρ E . W e often consider cases w h ere a quan tum state ma y d ep end on some classical random v ariable X , in that it is describ ed b y the densit y matrix ρ x E if and only if X = x . F or an obs er ver w h o has only a ccess 2.4. Entropies 16 to the register E but not to X , th e b eha vior of the state is determined by the densit y matrix P x P X ( x ) ρ x E . Th e joint state, consisting of the c lassical X and the q u antum register E and therefore called c q-state , is describ ed b y the d ensit y matrix P x P X ( x ) | x i h x | ⊗ ρ x E . In order to ha ve more compact expr essions , w e use the follo wing notation. W e wr ite ρ X E = X x P X ( x ) | x i h x | ⊗ ρ x E and ρ E = tr X ( ρ X E ) = X x P X ( x ) ρ x E . More general, for any even t E , we write ρ X E |E = X x P X |E ( x ) | x i h x | ⊗ ρ x E and ρ E |E = tr X ( ρ X E |E ) = X x P X |E ( x ) ρ x E . W e also write ρ X = P x P X ( x ) | x i h x | for the quantum represent ation of the classical r andom v ariable X (and similarly for ρ X |E ). This notation extends naturally to quan tum states that d ep end on s everal classical random v ariables (i.e. to ccq-states, cccq-states etc.). Giv en a cq-state ρ X E as ab o v e, b y sa ying that there exists a ran d om v ariable Y such that ρ X Y E satisfies some condition, w e mean that ρ X E can b e u ndersto o d as ρ X E = tr Y ( ρ X Y E ) for a ccq-state ρ X Y E that satisfies the required cond ition. Ob viously , ρ X E = ρ X ⊗ ρ E holds if and only if the quantum part is indep en- den t of X (in that ρ x E = ρ E for an y x ), wh ere th e latter in p articular implies that no inform ation on X can b e learned by observing only ρ E . F ur thermore, if ρ X E and ρ X ⊗ ρ E are ε -clo se in terms of their trace distance δ  ρ, σ  = 1 2 tr( | ρ − σ | ), then the real system ρ X E “b eha v es” as the ideal system ρ X ⊗ ρ E except with probabilit y ε (as explained by Renn er and K¨ onig in [RK05]) in that for any ev olution of the system no observ er can distinguish the real from the ideal one with adv an tag e greater than ε . 2.4 En tropies 2.4.1 Classical R´ en yi E n trop y Definition 2.6 L et P b e a pr ob ability distribution over the finite set X and α ∈ [0 , ∞ ] . The α -order sum of the pr ob ability distribution P is define d as π α ( P ) : = P x ∈X P ( x ) α . In the limits α → ∞ and α → 0, w e set π ∞ ( P ) : = max x ∈X P ( x ) and π 0 ( P ) : = |{ x ∈ X : P ( x ) > 0 } . Definition 2.7 (R´ en yi en trop y [R ´ en61]) L et P b e a pr ob ability distribution over the finite set X and α ∈ [0 , ∞ ] . The R´ en yi en trop y of order α is define d as H α ( P ) : = 1 1 − α log ( π α ( P )) = − log   X x ∈X P ( x ) α ) 1 α − 1  . 2.4. Entropies 17 In the limit α → ∞ , we obtain the min-e ntr opy H ∞ ( P ) = − log  max x ∈X P ( x )  and for α → 0, w e obtain max-entr opy H 0 ( P ) = log |{ x ∈ X : P ( x ) > 0 }| . An- other imp ortant sp ecial case is the case α = 2, also known as c ol lision pr ob ability π 2 ( P ) = P x ∈X P ( x ) 2 and c ol lision entr opy H 2 ( P ) = − log  P x P ( x ) 2  . F or the limit α → 1, w e can use Jen sen’s in equalit y (Lemma 2.2) with p x : = P ( x ) to obtain − 1 α − 1 log X x p x P ( x ) α − 1 ! ≤ − X x p x log  ( P ( x ) α − 1 ) 1 α − 1  . In the limit α → 1, all P ( x ) α − 1 go to 1 and therefore, equalit y h olds and we obtain the sta nd ard definition of Shannon entr op y H( P ) : = − P x P ( x ) log P ( x ) as in [Sha48]. F or a random v ariable X w ith p robabilit y d istribution P X , we will most often sligh tly abuse notation and use the common shortcut H α ( X ) instead of H α ( P X ). F or a fixed r andom v ariable X ov er the finite set X , α 7→ H α ( X ) is a decreasing function on [0 , ∞ ]: log |X | ≥ H 0 ( X ) ≥ H( X ) ≥ H 2 ( X ) ≥ H ∞ ( X ) , with equalit y if and only if X is uniform o v er a su bset of X . F urth er m ore, we ha v e th at for α > 1, π α ( X ) = P x P X ( x ) α ≥ max x P X ( x ) α and therefore, H α ( X ) = 1 1 − α log π α ( X ) ≤ 1 1 − α log max x P X ( x ) α = α 1 − α log max x P X ( x ) , whic h implies th e follo wing relation b et we en R´ en yi en tropies of order α > 1: α − 1 α H α ( X ) ≤ H ∞ ( X ) . (2.1) Conditional R ´ en yi entrop y The R ´ enyi entrop y H α ( X | Y = y ) of X give n the eve nt Y = y is naturally d efined as H α ( X | Y = y ) = 1 1 − α log  P x P X | Y = y ( x ) α  . W e can defi ne th e c onditional α -or der sum of X give n Y and c ondition al R ´ enyi entr opy by π α ( X | Y ) : = max y X x P X | Y = y ( x ) α and H α ( X | Y ) : = 1 1 − α log( π α ( X | Y )) . In the limits w e hav e, π ∞ ( X | Y ) = m ax x,y P X | Y = y ( x ), π 0 ( X | Y ) = max y |{ x ∈ X : P X | Y = y ( x ) > 0 }| . F or the conditional min-, collision- and max-ent ropy , w e get H ∞ ( X | Y ) : = min y H ∞ ( X | Y = y ) = min x,y − log P X | Y = y ( x ) , H 2 ( X | Y ) : = min y H 2 ( X | Y = y ) = min y − log X x P X | Y = y ( x ) 2 ! , H 0 ( X | Y ) : = max y H 0 ( X | Y = y ) = max y log |{ x ∈ X : P X | Y = y ( x ) > 0 }| . 2.4. Entropies 18 In the limit α ↓ 1, we get H ↓ 1 ( X | Y ) = min y H( X | Y = y ) and for α ↑ 1, w e get H ↑ 1 ( X | Y ) = max y H( X | Y = y ) whic h m igh t b e d ifferen t. How ev er, the standard defin ition of conditional Sh annon en trop y is neither of th ose, bu t “in b et we en”: H( X | Y ) : = X y P Y ( y ) H( X | Y = y ) = X x,y P X Y ( x, y ) log P X | Y = y ( y ) . W e note that in the literature, H α ( X | Y ) is sometimes defined as a v erage o v er Y , P y P Y ( y ) H α ( X | Y = y ), lik e for Shannon entrop y . Ho w ev er, we defi ne the more natural follo wing notion. F or 1 < α < ∞ , we defi ne the aver age c onditional R ´ enyi entrop y ˜ H α ( X | Y ) as ˜ H α ( X | Y ) : = − log  X y P Y ( y )  X x P X | Y ( x | y ) α ) 1 α − 1  , and as ˜ H ∞ ( X | Y ) = − log  P y P Y ( y ) max x P X | Y ( x | y )  for α = ∞ . Th is n otion is usefu l in particular b ecause it has the prop ert y that if th e aver age cond itional R ´ enyi entrop y is large, th en the conditional R´ en yi en trop y is large with high probabilit y: Lemma 2.8 L et α > 1 (al lowing α = ∞ ) and t ≥ 0 . Then with pr ob ability at le ast 1 − 2 − κ (over the choic e of y ) H α ( X | Y = y ) ≥ ˜ H α ( X | Y ) − κ . Pro of: By definition of av erag e conditional R´ en yi entrop y , w e hav e 2 − ˜ H α ( X | Y ) = E y h ( π α ( X | Y = y )) 1 α − 1 i . By the Mark o v’s inequalit y (Lemma 2.4), w e get that Pr y h π α ( X | Y = y ) 1 α − 1 ≥ 2 − ˜ H α ( X | Y )+ κ i ≤ 2 − κ and therefore, the probabilit y (o ve r y ) that H α ( X | Y = y ) ≤ ˜ H α ( X | Y ) − κ is at most 2 − κ .  As long as α > 1, the minimization (or av erage) o v er y is the same for all orders of R ´ enyi entrop y h en ce, Equation (2.1) translates to (a v erage) conditional R ´ enyi en tropy: Lemma 2.9 F or any 1 < α < ∞ , we have H 2 ( X | Y ) ≥ H ∞ ( X | Y ) ≥ α − 1 α H α ( X | Y ) ˜ H 2 ( X | Y ) ≥ ˜ H ∞ ( X | Y ) ≥ α − 1 α ˜ H α ( X | Y ) . 2.4. Entropies 19 Conca vit y Lemma 2.10 F or 0 ≤ α ≤ 1 , R´ enyi Entr opy is a conca v e ent ropic fun ctional , i.e., for 0 ≤ s ≤ 1 and distributions P , Q , we have H α ( sP + (1 − s ) Q ) ≥ s H α ( P ) + (1 − s ) H α ( Q ) . F or the case of Shannon entrop y , note th at the function f ( p ) : = − p log p has deriv ati ve s f ′ ( p ) = − 1 − log p and f ′′ ( p ) = − 1 /p and f ′′ ( p ) ≤ 0 for 0 ≤ p ≤ 1. Therefore, f ( p ) is conca v e and we h a v e H( sP + (1 − s ) Q ) = X x f ( sP ( x ) + (1 − s ) Q ( x )) ≥ X x sf ( P ( x )) + (1 − s ) f ( Q ( x )) = s X x f ( P ( x )) + (1 − s ) X x f ( Q ( x )) = s H( P ) + (1 − s ) H( Q ) . Higher-order R ´ enyi en trop y is not n ecessarily conca v e as the follo wing ex- ample illustrates. Consider the distributions P ( x ) = δ x, 0 and Q ( x ) = 2 − n o v er { 0 , 1 } n with H 2 ( P ) = 0 and H 2 ( Q ) = n . F or the equal mixture of these distrib utions h olds H 2 (( P + Q ) / 2) = − log(1 / 4) + O (2 − n ) ≈ 2 < n/ 2 = (H 2 ( P ) + H 2 ( Q )) / 2 for n > 5. F ano’s Inequalit y Lemma 2.11 (F ano’s Inequalit y) L et X ↔ Y ↔ X ′ b e a M arkov c hain 2 . Then, for the err or pr ob ability p e : = P [ X 6 = X ′ ] , i t holds H( X | Y ) ≤ h ( p e ) + p e · log( |X | − 1) . Pro of: W e denote b y E : = 1 { X 6 = X ′ } the indicato r random v ariable of the ev en t { X 6 = X ′ } that the guess w as n ot successful. By the c hain rule for Shannon en trop y , we can write H( X E | Y ) = H( X | Y ) + H( E | X Y ) = H( E | Y ) + H( X | E Y ) W e observ e that H ( E | Y ) ≤ h ( p e ), H( E | X Y ) ≥ 0 and H( X | E Y ) = (1 − p e ) H( X |{ X = X ′ } Y ) + p e H( X |{ X 6 = X ′ } Y ) = p e log( |X | − 1) and the claim follo ws by rearranging the terms.  2.4.2 Smo oth R´ en yi En trop y Smo oth min- and max-entropies w ere introd uced b y Renn er and W olf in [Ren05, R W05] 3 . They are families of entrop y m easur es p arametrized by non-negativ e 2 Think of X ′ as guess of X based only on Y . 3 The notion of smo othing a pr ob ability distribution w as already used in [ILL89]. F u rt her- more, a different kind of smo oth R´ enyi entr opy (not equiv alent to th e ones used h ere) was introduced b y Cachin [Cac97]. 2.4. Entropies 20 real num b ers ε , called the smo othn ess . It is a generaliza tion of the n otions of conditional min- and m ax-entrop y defined in the last section. H ε ∞ ( X | Y ) : = max E min x,y − log  P X Y E ( x, y ) P Y ( y )  , H ε 0 ( X | Y ) : = min E max y log |{ x ∈ X : P X Y E ( x, y ) P Y ( y ) > 0 }| where the maximum/minim um ranges o v er all ev en ts E with pr obabilit y Pr[ E ] ≥ 1 − ε . P X Y E ( x, y ) is the p robabilit y that E occur s and X, Y tak e v alues x, y . Hence, the “distribution” P X Y E is not normalized. F or a giv en d istribution P X Y , it is easy to compute its sm o oth min-entrop y (max-en trop y), simply by cu tting a m axim um mass of ε off the largest (smallest) probabilities. Informally , the statement H ε ∞ ( X ) = r can b e understo o d that the standard min-en tropy of X is close to r , except with prob ab ility ε . As ε can b e in terpreted as an error pr obabilit y , we t ypically r equire ε to b e negligible in the secur ity parameter. The reason wh y we only defin e the min- and max-v ersions of smo oth R´ en yi en trop y is that it is sh o wn in [R W05] that for example smo oth R´ en yi en trop y of order α > 1 ob eys H ε + ε ′ ∞ ( X | Y ) + log(1 /ε ′ ) α − 1 ≥ H ε α ( X | Y ) ≥ H ε ∞ ( X | Y ) . and hence is equiv alent to smo oth min-en trop y up to an additive term which dep end s on α and the smo othness ε ′ . An analogue s tatemen t holds for α < 1 and smo oth max-en trop y . As p ointed out in [R W05], for ε = 0 the relation ab o v e shows for example that H 2 ( X ) cannot b e larger than H ε ∞ ( X ) + log(1 /ε ) whereas for th e non-sm o oth v ersions, we only kno w from Equation (2.1) that H 2 ( X ) ≤ 2 H ∞ ( X ). Most imp ortantly , smo oth min - and max-en trop y h a v e an op er ational me an- ing as they provide the ans w er to t wo f undamenta l inform ation-theoretic prob- lems: • H ε ∞ ( X | Y ) is the maxim um amount 4 of randomness that can be extracted from X and an in dep end en t random string R , su c h that except with p rob- abilit y ε , the extracted string lo oks completely uniform to an adversary who kn o ws Y and learns R . T his falls int o the setting of pr iv acy amplifi- cation, see Section 2.5 b elo w. • H ε 0 ( X | Y ) is the minimal length 4 of an enco din g computed fr om X and some additional in d ep endent randomness R , suc h th at except with p roba- bilit y ε , someone k n o wing Y and R ca n reconstruct X from the en co d ing. This is a data-compression problem whic h is often called information r e c- onciliation or e rr or c orr e ction in cryptographic settings. 4 up to some sma ll additive error term which dep ends lo garithmically on ε 2.4. Entropies 21 In [R W05], it is sho wn that smooth min - and m ax-entropies enjo y sev- eral Shannon-like p rop erties su ch as the c hain ru le (see Lemma 2.12 b elo w), sub-additivit y H ε ∞ ( X Y ) ≤ H ε + ε ′ ∞ ( X ) + H ε ′ 0 ( Y ) and mon otonicit y H ε ∞ ( X ) ≤ H ε ∞ ( X Y )). Lemma 2.12 (C hain Rule [R W05]) F or al l ε, ε ′ > 0 , we have H ε + ε ′ ∞ ( X | Y ) > H ε ∞ ( X Y ) − H 0 ( Y ) − log  1 ε ′  . As a consequence of the asymptotic equipartition prop erty (cf. [CT91]), smo oth R´ en yi entrop y is asymptotically equ al to S hannon entrop y in the fol- lo wing sense. Lemma 2.13 ([R W05 , HR06]) L et ( X 1 , Y 1 ) , . . . , ( X n , Y n ) b e n indep endent p airs of r andom variables distribute d ac c or ding to P X Y . Then, for any α 6 = 1 , lim ε → 0 lim n →∞ H ε α ( X n | Y n ) n = H( X | Y ) . Note that such a lemma do es not hold at all for non-smo oth R´ en yi entropies. T o provi de some intuitio n ab out smo oth min -en trop y , the follo wing lemma sho ws h o w to translate smo oth min-entrop y bac k to regular conditional min- en trop y . Lemma 2.14 If H ε ∞ ( X | Y ) = r then ther e exists an event E ′ such th at Pr( E ′ ) ≥ 1 − 2 ε and H ∞ ( X |E ′ , Y = y ) ≥ r − 1 for every y with P Y E ′ ( y ) > 0 . Pro of: By d efinition of smo oth min-en trop y , there exists an ev en t E with Pr( E ) ≥ 1 − ε an d suc h that H ∞ ( X E | Y = y ) ≥ r f or all y , and thus P X E | Y ( x | y ) ≤ 2 − r for all x and y . Define E ′ b y setting for all x an d y P X E ′ | Y ( x | y ) : =  P X E | Y ( x | y ) if P E | Y ( y ) ≥ 1 2 0 else Then ob viously for an y y with P Y E ′ ( y ) > 0 and thus P E ′ | Y ( y ) = P E | Y ( y ) ≥ 1 2 , P X |E ′ Y ( x | y ) = P X E ′ | Y ( x | y ) P E ′ | Y ( y ) ≤ 2 − r P E ′ | Y ( y ) ≤ 2 − r +1 . F urther m ore, 1 − ε ≤ Pr( E ) = Pr( E | P E | Y ( Y ) < 1 2 ) · Pr( P E | Y ( Y ) < 1 2 ) + Pr( E | P E | Y ( Y ) ≥ 1 2 ) · Pr( P E | Y ( Y ) ≥ 1 2 ) (2.2) ≤ 1 2 Pr( P E | Y ( Y ) < 1 2 ) + P r( P E | Y ( Y ) ≥ 1 2 ) 2.4. Entropies 22 from whic h follo ws th at Pr( P E | Y ( Y ) < 1 2 ) ≤ 2 ε . Thus we can conclude that Pr( E ′ ) ≥ Pr( E ′ | P E | Y ( Y ) ≥ 1 2 ) · Pr( P E | Y ( Y ) ≥ 1 2 ) ≥ Pr ( E | P E | Y ( Y ) ≥ 1 2 ) · Pr( P E | Y ( Y ) ≥ 1 2 ) ≥ 1 − ε − 1 2 Pr( P E | Y ( Y ) < 1 2 ) ≥ 1 − 2 ε where the second-last in equalit y follo ws f r om (2.2), and noting (once more) that Pr( E | P E | Y ( Y ) < 1 2 ) < 1 2 .  2.4.3 Min-En trop y-Splitting Lemma F or pro ving reductions betw een v arian ts of oblivious transfer in Sect ion 3.4 and the security of 1 -2 OT in the b oun ded-quant um storage in Ch apter 6, w e will mak e use of the f ollo wing min -en trop y s plitting lemma. Note that if the join t en trop y of tw o rand om v ariables X 0 and X 1 is large, then one is tempted to conclude that at least one of X 0 and X 1 m ust still ha v e large ent ropy , e.g. half of the original entrop y . Whereas this is indeed tru e for Sh annon en tropy , it is in general not true for min -entrop y . The follo wing lemma, though, which first app eared in a preliminary v ersion of [W ul07 ], sho ws that it is true in a randomized sense. Lemma 2.15 (Min-E n trop y-Splitting Lemma) L et ε ≥ 0 , and let X 0 , X 1 b e r andom variables with H ε ∞ ( X 0 X 1 ) ≥ α Then, ther e exists a r andom variable C ∈ { 0 , 1 } such that H ε ∞ ( X 1 − C C ) ≥ α/ 2 . Pro of: Belo w, w e giv e the pro of f or ε = 0, i.e., for ordinary (non-smo oth) min- en trop y . T he general clai m for smo oth min-en trop y follo ws immediately by observing that the same argumen t also works for non-normalized d istributions with a total prob ab ility sm aller than 1. W e extend the prob ab ility distribution P X 0 X 1 as follo ws to P X 0 X 1 C . Let C = 1 if P X 1 ( X 1 ) ≥ 2 − α/ 2 and C = 0 otherwise. W e ha v e that for all x 1 , P X 1 C ( x 1 , 0) either v anishes or is equal to P X 1 ( x 1 ). I n any case, P X 1 C ( x 1 , 0) < 2 − α/ 2 . On th e other hand, for all x 1 with P X 1 C ( x 1 , 1) > 0, we ha v e that P X 1 C ( x 1 , 1) = P X 1 ( x 1 ) ≥ 2 − α/ 2 and therefore, for all x 0 , P X 0 X 1 C ( x 0 , x 1 , 1) ≤ 2 − α = 2 − α/ 2 · 2 − α/ 2 ≤ 2 − α/ 2 P X 1 ( x 1 ) . Summing o v er all x 1 with P X 0 X 1 C ( x 0 , x 1 , 1) > 0, and thus with P X 1 C ( x 1 , 1) > 0, results in P X 0 C ( x 0 , 1) ≤ X x 1 2 − α/ 2 P X 1 ( x 1 ) ≤ 2 − α/ 2 . This shows that P X 1 − C C ( x, c ) ≤ 2 − α/ 2 for all x, c .  The corollary b elo w follo ws rather straigh tforw ardly b y noting that (for normalized as we ll as n on -n ormalized distributions) H ∞ ( X 0 X 1 | Z ) ≥ α holds exactly if H ∞ ( X 0 X 1 | Z = z ) ≥ α for all z , applying the Min-Entrop y S plitting Lemma, and then u s ing the c hain rule, Lemma 2.12. 2.4. Entropies 23 Corollary 2.16 L et ε ≥ 0 b e give n, and let X 0 , X 1 , Z b e r ando m variables with H ε ∞ ( X 0 X 1 | Z ) ≥ α . Then, ther e exists a binary r andom variable C ∈ { 0 , 1 } such that for ε ′ > 0 , H ε + ε ′ ∞ ( X 1 − C | Z C ) ≥ α/ 2 − 1 − log (1 /ε ′ ) . 2.4.4 En trop y of Quantum States As p ointed out in [RK05], R´ en yi en trop y H α ( ρ ) can also b e defi ned for a qu an- tum state ρ ∈ P ( H ). F or α ∈ [0 , ∞ ] and ρ ∈ P ( H ), w e hav e H α ( ρ ) : = 1 1 − α log (tr ( ρ α )) . In the limit cases α → 0 and α → ∞ , we obtain H 0 ( ρ ) = log (rank( ρ )) and H ∞ ( ρ ) = − log ( λ max ( ρ )), where λ max ( ρ ) denotes the maxim um eigen v alue of ρ . F or α = 2, we obtain the c ol lision entr opy H 2 ( ρ ) = − log  P i λ 2 i  , w h ere { λ i } i are the eigen v alues of ρ . F or a classical random v ariable X enco ded in ρ X = P x P X ( x ) | x i h x | , it h olds that that H α ( ρ X ) = H α ( X ). F or derivin g our v ersion of the priv acy-amplificati on theorem in the next section, w e need the s lightly more inv olved v ersion of quan tum conditional min-en tropy fr om [Ren05]. Definition 2.17 ([Ren05]) L et ρ AB ∈ P ( H A ⊗ H B ) and σ B ∈ P ( H B ) . The min-entr opy of ρ AB r elative to σ B is H min ( ρ AB | σ B ) : = − log λ wher e λ is the minimum r e al nu mb er such that λ · 1 A ⊗ σ B − ρ AB is non -ne gative. The min-entr opy of ρ AB given H B is H min ( ρ AB | B ) : = su p σ B H min ( ρ AB | σ B ) wher e the supr emum r anges over al l σ B ∈ P ( H B ) . Similar to the classical case, the smo oth v ersion can b e d efi ned as f ollo ws. Definition 2.18 ([Ren05]) L et ρ AB ∈ P ( H A ⊗ H B ) , σ B ∈ P ( H B ) , and ε ≥ 0 . The ε -smo oth min-entr opy of ρ AB r elative to σ B is H ε min ( ρ AB | σ B ) : = su p ρ AB H min ( ρ AB | σ B ) wher e the supr emum r anges over the set B ε ( ρ AB ) c ontaining al l H e rmitian, non-ne gative op e r ators ρ AB acting on H A ⊗ H B such that δ  ρ AB , ρ AB  ≤ 2 ε and tr( ρ AB ) ≤ 1 . The ε -smo oth min-entr opy g iven H B is H ε min ( ρ AB | B ) : = su p σ B H ε min ( ρ AB | σ B ) wher e the supr emum r anges over al l σ B ∈ P ( H B ) . 2.4. Entropies 24 T o compute H ε min ( ρ X B | σ B ) where ρ X B is a cq-state, the suprem um can b e restricted to states ρ X B ∈ B ε ( ρ X B ) whic h are classical on H X as w ell [Ren05, Remark 3.2.4]. There is a c hain rule for smo oth min-ent ropy , p ro v en in [Ren05, Lemma 3.2.9]. Lemma 2.19 ([Ren05 ]) L et ρ X U E ∈ P ( H X ⊗ H U ⊗ H E ) , σ U ∈ P ( H U ) , and let σ E ∈ P ( H E ) b e the fu l ly mixe d state on the image of ρ E , and let ε ≥ 0 . Then H ε min ( ρ X U E | σ U ) − H max ( ρ E ) ≤ H ε min ( ρ X U E | σ U ⊗ σ E ) . The follo wing tw o lemmas state that dropp ing a quant um register cannot increase the (smo oth) min-en trop y . Lemma 2.20 L et ρ X U Q ∈ P ( H X ⊗ H U ⊗ H Q ) b e a c c q- state. Then, H min ( ρ X U Q | ρ U ) ≥ H min ( ρ X U | ρ U ) . Pro of: F or λ : = 2 − H min ( ρ X U | ρ U ) , w e hav e by Definition 2.17 that λ · 1 X ⊗ ρ U − ρ X U ≥ 0. Usin g that b oth X and U are classical, we deriv e that for all x, u , it holds λ · p u − p xu ≥ 0, where p u and p xu are shortcuts f or the probab ilities P U ( u ) and P X U ( x, u ). Let the normalized cond itional op erator ρ x,u Q b e the quan tum state conditioned on the eve nt that X = x and U = u , i.e. X x,u p xu ρ x,u Q ⊗ | xu i h xu | = ρ QX U . Then, X x,u λ · p u ρ x,u Q ⊗ | xu i h xu | − p xu ρ x,u Q ⊗ | x u i h xu | ≥ 0 . Because of ρ x,u Q ≤ 1 Q , we get X x,u λ · p u 1 Q ⊗ | xu i h xu | − p xu ρ x,u Q ⊗ | xu i h xu | ≥ 0 . Therefore, λ · 1 QX ⊗ ρ U − ρ QX U ≥ 0 holds, from whic h follo w s b y definition that H min ( ρ X U Q | ρ U ) ≥ − log ( λ ).  Lemma 2.21 L et ρ X U Q ∈ P ( H X ⊗ H U ⊗ H Q ) b e a c c q- state and let ε ≥ 0 . Then H ε min ( ρ X U Q | ρ U ) ≥ H ε min ( ρ X U | ρ U ) . Pro of: After the remark after Definition 2.18 ab o v e, there exists σ X U ∈ B ε ( ρ X U ) classical on H X ⊗ H U suc h that H ε min ( ρ X U | ρ U ) = H min ( σ X U | σ U ). Because b oth X and U are classical, we can wr ite σ X U = P x,u p xu | xu i h xu | and extend it to obtain σ X U Q : = P x,u p xu | xu i h xu | ⊗ ρ x,u Q . Lemma 2.20 from ab o v e yields H min ( σ X U | σ U ) ≤ H min ( σ X U Q | σ U ). W e hav e by construction th at δ  σ X U Q , ρ X U Q  = δ  σ X U , ρ X U  ≤ 2 ε . Therefore, σ X U Q ∈ B ε ( ρ X U Q ) and H min ( σ X U Q | σ U ) ≤ H ε min ( ρ X U Q | ρ U ) .  2.5. Tw o-Univers al Hash ing and Priv acy Amplifica tion 25 2.5 Tw o-Univ ersal Hashing and Pr iv acy Amplifica- tion against Q u an tum A d v ersaries 2.5.1 History and Setting of Priv acy Amplification Assume t w o p arties Alice and Bob share some inf ormation X which is only partly secur e in the sense th at an adve rsary Ev e h as some partial knowledge ab out it. Privacy Amplific ation , in tro duced by Bennett, Brassard, and Rob ert [BBR88], is the art of trans f orming this information X in to a highly secure ke y K b y public d iscussion. The honest parties w an t to end up with an almost uniformly d istributed key K ab out whic h Ev e has only negligible information giv en the communicati on. A common wa y to ac hiev e this is to h a v e Alice pic k a h ash function f at random from a t wo -universal class of hashin g functions (see next section for the definition), apply it to X and ann ounce it to Bob, who applies it to X as w ell. Due to the r an d omizing p rop erties of a t wo-univ ersal function, the output f ( X ) is close to uniform ly distributed from Ev e’s p oint of view. As shown in [BBR88] and b y Imp agliazz o, Levin, Luby [ILL89] and Bennett, Brassard, Cr ´ ep eau, and Maurer [BBCM95], th e classical privacy amplific ation the or em or left-over hash lemma (see C orollary 2.27 b elo w) states that if Eve has some classical kno wledge W ab out X , a s ecur e k ey of length roughly the uncertain t y of Eve ab out X (measured in terms of min-en tropy) can b e extracted by t wo - unive rsal hashing. It is p oint ed out in [R W05], that the maximum amount of extractable randomness is essent ially giv en by the conditional smo oth min - en trop y H ε ∞ ( X | W ). It is inte resting to in v estigate the case when Eve holds quan tum infor- mation ab out X . This scenario has b een considered b y K¨ onig, Maurer, and Renner [KMR05, RK05, Ren05] and the results repro duced b elo w sho w that t w o-univ ersal hashing w orks j ust as we ll against quan tum as against classical adv ersaries. W e note that un lik e in the classical case, where man y other forms of ran- domness extractors are kno wn, t w o-unive rsal hashin g is essen tially the only w a y to p erform priv acy amplification against quan tum adv ersaries. 5 This to ol is one of the ke y ingredien ts in all proto cols p r esen ted in th is thesis. It h as b een widely used in other applications as w ell, for example in s ecur it y pro ofs of quan tum-k ey-distribution sc hemes b y Christandl, Renner, Ekert, Kraus, and Gisin [CRE04, KGR05, RGK05, Ren05]. 2.5.2 Tw o-Univ ersal Hashing An imp ortant to ol we use is t w o-univ ersal hashin g. Definition 2.22 A class F n of ha shing fu nctions fr om { 0 , 1 } n to { 0 , 1 } ℓ is c al le d t w o-univ ersal , if for any p air x, y ∈ { 0 , 1 } n with x 6 = y , and F uniformly 5 In a recen t pap er, K¨ onig and T erh al [KT06] exhibit some extractors whic h w ork against quantum adversa ries, but th e parameters are far from the classical ones. 2.5. Tw o-Univers al Hash ing and Priv acy Amplifica tion 26 chosen fr om F n , it holds that P  F ( x ) = F ( y )  ≤ 1 2 ℓ . W e can also define a sligh tly stronger notion of tw o- un iversalit y as follo ws: Definition 2.23 A class F n of ha shing fu nctions fr om { 0 , 1 } n to { 0 , 1 } ℓ is c al le d strongly t w o-univ ersal , if for any p air x, y ∈ { 0 , 1 } n with x 6 = y , and F uniformly chosen fr om F n , the r andom variables F ( x ) and F ( y ) ar e indep endent and uniformly distribute d over { 0 , 1 } ℓ . Sev eral t w o-unive rsal and strongly tw o-univ ersal classes of h ashing fun ctions are suc h that ev aluating and pic king a function uniformly an d at random in F n can b e d one efficient ly , as p oin ted out by W egman and Carter [CW77, W C79]. 2.5.3 Priv acy Amplification against Quan t um Adv ersaries In the follo wing, w e consider the situation where a hash fun ction is pic k ed randomly fr om F n and applied to a classical v alue X ∈ { 0 , 1 } n whic h is cor- related with a qu an tum r egister H E . F ormally , starting with the cq-state ρ X E = P x ∈{ 0 , 1 } n P X ( x ) | x i h x | ⊗ ρ x E , w e obtain ρ F ( X ) F E = X f ∈F n X z ∈{ 0 , 1 } ℓ | z i h z | ⊗ | f i h f | ⊗ X x ∈ f − 1 ( z ) P X ( x ) ρ x E . (2.3) The follo win g pr iv acy-amplification theorem in the presence of quan tum adv er- saries was first deriv ed in [RK05]. The version b elo w is from [Ren05, Corollary 5.6.1] 6 . Theorem 2.24 (Priv acy Amplification [Ren05]) L et ρ X B ∈ P ( H X ⊗ H B ) b e a c q-state, wher e X takes values i n { 0 , 1 } n . L et F n b e a two-unive rsal family of hash functions fr om { 0 , 1 } n to { 0 , 1 } ℓ , and let ε ≥ 0 . Then, for the c c q-state ρ F ( X ) F B define d by (2.3) , it holds δ  ρ F ( X ) F B , 1 ⊗ ρ F B  ≤ ε + 1 2 2 − 1 2 (H ε min ( ρ X B | B ) − ℓ ) . F or large parts of this thesis, sligh tly w eak er forms of this theo rem are u sed. These are derived in the f ollo wing. Corollary 2.25 L et ρ X U E b e a c c q-state, wher e X takes values in { 0 , 1 } n , U in the finite domain U and r e gister E c ont ains q qubits. L et F n b e a two-universal family of hash fu nc tions fr om { 0 , 1 } n to { 0 , 1 } ℓ , and let ε ≥ 0 . Then, for the c c c q -state ρ F ( X ) F U E define d analo g ous to (2.3) , it holds δ  ρ F ( X ) F U E , 1 ⊗ ρ F U E  ≤ 1 2 2 − 1 2  H ε ∞ ( X | U ) − q − ℓ  + ε. (2.4) 6 Note that in [Ren05], the distance from uniform is defined in terms of the trace-norm distance w hich is tw ice the v ariational distance used in this thesis. 2.5. Tw o-Univers al Hash ing and Priv acy Amplifica tion 27 Recall that b y the definition of the trace-distance, we hav e that if the righ t- most term of (2.4) is negligible, i.e. sa y smaller than 2 − λn , then this situation is 2 − λn -close to the ideal situation w here F ( X ) is p erfectly uniform and inde- p endent of F , U and E . In particular, replacing F ( X ) by an in dep end en t and uniformly distributed bit results in a common state whic h essentiall y cannot b e distinguished fr om the original one. Pro of: In our case, the quan tum register B fr om Th eorem 2.24 consists of a classical part U and a quan tum part E . Denoting by σ E the f u lly mixed state on the image of ρ E , w e only need to co nsider the term in the exp onen t to deriv e Theorem 2.25 as follo ws H ε min ( ρ X U E | U E ) ≥ H ε min ( ρ X U E | ρ U ⊗ σ E ) ≥ H ε min ( ρ X U E | ρ U ) − H max ( ρ E ) (2.5) ≥ H ε min ( ρ X U | ρ U ) − H max ( ρ E ) (2.6) = H ε ∞ ( X | U ) − q . The fir st inequ ality follo ws by Definition 2.18 of H ε min as sup rem um o v er all σ U E . Inequ alit y (2.5) is the c hain rule f or smo oth min-ent ropy (Lemma 2.19). Inequalit y (2.6) uses that the smo oth min-ent ropy cannot decrease wh en drop- ping the quantum register whic h is prov en in Lemma 2.21 from the last section. The last step follo ws b y assu m ption ab out the quantum register and observ- ing that th e state ρ X U is classical and th e quant um Definition 2.18 therefore reduces to classical sm o oth min-en tropy .  The follo wing corollary is a dir ect consequence of Corollary 2.25. In Chap- ter 7, this lemma will b e usefu l for proving the binding condition of our com- mitmen t sc heme. Recall that for X ∈ { 0 , 1 } n , B δn ( X ) denotes the set of all n -bit strings at Hammin g distance at most δ n fr om X and B δn : = | B δn ( X ) | is the num b er of s u c h strings. Corollary 2.26 L et ρ X U E b e a c c q-state, wher e X takes values in { 0 , 1 } n , U in the finite domain U and r e gister E c ontains q qubits. L et ˆ X b e a guess for X obtaine d by le arning U and me asuring E , and let ε ≥ 0 . Then, for al l δ < 1 2 it holds that P  ˆ X ∈ B δn ( X )  ≤ 2 − 1 2 (H ε ∞ ( X | U ) − q − 1)+log (B δn ) + 2 ε · B δn . In other words, giv en some classica l kno wledge U and a qu antum memory of q qub its arbitrarily correlated w ith a classical random v ariable X , the p rob- abilit y to find ˆ X at Hamming d istance at most δ n from X where n h ( δ ) < 1 2 (H ε ∞ ( X | U )) − q ) is small. Pro of: Here is a strategy to try to bias F ( X ) when giv en ˆ X and F ∈ R F n : Sample X ′ ∈ R B δn ( ˆ X ) and output F ( X ′ ). Note that, usin g p succ as a short hand for the pr ob ab ility P  ˆ X ∈ B δn ( X )  to b e b ounded, P  F ( X ′ ) = F ( X )  = p succ B δn +  1 − p succ B δn  1 2 = 1 2 + p succ 2 · B δn , 2.5. Tw o-Univers al Hash ing and Priv acy Amplifica tion 28 where the fi r st equ ality follo ws from the fact that if X ′ 6 = X then, as F n is t w o-univ ersal, P [ F ( X ) = F ( X ′ )] = 1 2 . Note that, giv en F and U and b eing allo w ed to m easure E , the probabilit y of correctly guessing a binary F ( X ) is upp er b ound ed b y 1 2 + δ  ρ F ( X ) F U E , 1 ⊗ ρ F U E  [FvdG99]. In com bination w ith Corollary 2.25 (with ℓ = 1) the ab o v e resu lts in 1 2 + p succ 2 · B δn ≤ 1 2 + 1 2 2 − 1 2 (H ε ∞ ( X | U ) − q − 1) + ε and the claim follo ws by rearranging the terms.  2.5.4 Classical Priv acy Amplification The classical priv acy-a mplification theorem follo ws as sp ecial case f r om the results ab o v e. When there is no quan tum correlation, we (almost) reco v er th e w ell-kno wn classical left-over hash lemma [ILL89, BBCM95, HILL99]: Corollary 2.27 L et X b e a r andom variable over { 0 , 1 } n , and let F denote the uniform choic e of a hash function in a two-universal family of hash functions F n mapping fr om { 0 , 1 } n to { 0 , 1 } ℓ . Then δ  P F ( X ) F , P unif ℓ P F  ≤ 1 2 2 − 1 2 (H 2 ( X ) − ℓ ) . This corolla ry (with collision- instead of min-entrop y in the exp onent on the righ t-hand side) cannot immediately b e deriv ed from Theorem 2.24 ab o v e, but rather from its pro of in [Ren05]. The reason for this is that the easiest wa y of pro ving b oth Theorem 2.24 and Corollary 2.27 is by directly considering collision en trop y instead of min-entrop y . On the other hand, r elaxing the notion of colli sion entrop y to smooth min-entrop y g iv es the natural op erativ e meaning (see Section 2.4.2) and inte restingly , it only lo oks lik e w e are losing something b y doing that, b ut in fact this ac hiev es optimalit y [R W05]. Chapter 3 Classi cal O blivi ous T ransfer Most of the results presen ted in this c hapter are publish ed in [DFSS 06]. 3.1 In tro duction and Outline As already men tioned in S ection 1.1, 1-out-of-2 Oblivious-T ransfer, 1 -2 OT for short, is a t wo- party primitive whic h allo ws a sender to send tw o bits (or, more generally , strings) B 0 and B 1 to a receiv er, who is allo w ed to learn one of the t w o according his choice C . In f ormally , it is required that the r eceiv er only learns B C but not B 1 − C (what we call securit y for the hon est sender, hence sender- se cu rity ), wh ile at th e s ame time the sender do es n ot learn C ( r e c eiver- se cu rity ). In terestingly , 1 -2 OT wa s introd u ced b y Wiesner around 1970 (bu t only pub- lished muc h later [Wie83]) under the name of “m ultiplexing” in the cont ext of quan tum cryptograph y , and, inspired by [Rab81] where a d ifferen t fl a v or was in tro du ced, later r e-discov ered by Ev en, Goldreic h and Lemp el [EGL82]. 1 -2 OT turn ed out to b e very p ow erful as Kilian [Kil88] sh o w ed it to b e sufficien t for secure general t w o-part y computation. F or this reason, m uc h effort h as b een p u t into r educing 1 -2 OT to seemingly we ak er flav ors of OT , lik e Rabin OT , 1 -2 X OT , etc. [Cr´ e87, BC97, C ac98 , W ol00, BCW03 , CS06]. In this c hapter, we fo cus on a sligh tly mo dified notion of 1 -2 OT , whic h w e call R ando mize d 1 -2 OT , Rand 1 -2 OT for short, where the bits (or strings) B 0 and B 1 are not in put by the s en der, but generated uniformly at random d uring the Rand 1 -2 O T and then out put to the sender. It is still required that the receiv er only learns the bit (or string) of his c hoice, B C , wh ereas the sender do es not learn an y inf orm ation on C . It is ob vious that a Rand 1 -2 OT can easily b e turned into an ord inary 1 -2 OT simply by us ing the generated B 0 and B 1 to mask the actual inpu t bits (or strings). F u rthermore, all kno wn constructions of unconditionally secure 1 -2 OT proto cols make implicitly the detour via Rand 1 -2 O T . In a first step, w e ob s erv e th at the s ender-securit y condition of a Ran d 1 -2 OT of bits is equiv alent to requiring the XOR B 0 ⊕ B 1 to b e close to uniformly dis- tributed from the receiv er’s p oin t of view. Th e pro of is very simple, and it is kind of surpr ising that—to the b est of our kno wledge—this has not b een real- ized b efore. W e then ask and answ er the question whether there is a natural 29 3.2. Defining 1 -2 OT 30 generalizat ion of this result to Rand 1 -2 OT of strings . Not e th at requirin g the b it wise X OR of the tw o strings to b e uniformly distrib uted is ob viously not sufficient . W e sho w that the sender-secur ity for Rand 1 -2 OT of strings can b e characte rized in terms of non-de g e ner ate line ar fu nctions (biv ariate b i- nary linear functions whic h non-trivially dep end on both argumen ts, as defined in Definition 3.3): sen der-securit y holds if and only if the result of applyin g an y n on-degenerate linear f unction to th e tw o strings is (close to) un if orm ly distributed from the r eceiv er’s p oin t of view. W e then sho w the usefulness of this new unders tand ing of 1 -2 OT . W e demonstrate this on the p roblem of reducing 1 -2 OT to weak er primitive s. Con- cretely , w e sho w that the redu cibilit y of an ordinary 1 -2 OT to w eak er fl a v ors via a non-interac tiv e reduction follo ws b y a trivial argumen t f r om ou r charac- terizatio n of sen d er-securit y . This is in sharp con trast to the cur ren t literature: The pro ofs giv en by Brassard , Cr´ ep eau and W olf [BC97, W ol00, BCW03] for reducing 1 -2 OT to 1 -2 X OT , 1 -2 GOT and 1 -2 UOT (w e refer to Section 3.4 for a description of these fla v ors of OT ) are rather complicated and tailored to a p articular class of priv acy-amplifying h ash f u nctions; w hether th e reduc- tions also w ork for a less r estricted class is left as an op en problem [BCW03, page 222]. And, the pro of giv en by Cac hin [Cac98] f or reducing 1 -2 OT to one execution of a general UOT is not only complicated, but also incorr ect, as we will p oin t out. Thus, our charact erization of the condition for send er-securit y allo ws to simplify existing reducibilit y pro ofs and, along th e wa y , to solv e th e op en problem p osed in [BCW03], as we ll as to impro v e th e reduction parameters in most cases, but it also allo ws for new, resp ectiv ely unti l no w only incorrectly pro v en reductions. In r ecen t work by W ullsc hleger [W ul07], the analysis of these reductions is fu rther impro v ed. F urther m ore, we extend our resu lt and sh o w how our c haracterizatio n of Rand 1 -2 OT in terms of non-degenerate linear fu nctions translates to 1 - n OT . As historical side n ote, we note that the original motiv at ion for c haracter- izing sender-secur it y with the help of NDLFs w as to pro v e sender-securit y of the qu an tum p roto col for 1 -2 O T describ ed in Ch apter 6. W e p oin t out by an example in Section 3.6 at the end of this c hapter wh y this approac h do es n ot w ork. 3.2 Defining 1 -2 OT 3.2.1 Randomized 1 -2 OT of Bits F ormally capturing the intuitiv e un derstanding of the secur it y of 1 -2 O T is a non-trivial an d subtle task. F or instance requirin g the sender’s view to b e indep end en t of the receiv er’s choic e b it C is too strong a requirement, since his input migh t already depen d on C . The b est one can hop e for is that his view is indep end en t of C c onditione d on his input B 0 , B 1 . Secur it y against a dishonest receiv er is even more subtle. W e refer to the securit y definition b y C r ´ ep eau, Sa vvides, S c haffner and W u llsc hleger of [CSSW06], w h ere it is argued that this definition is th e “right ” wa y to defin e un conditionally secur e 1 -2 OT . In their 3.2. Defining 1 -2 OT 31 mo del, a secure 1 -2 OT proto col is as goo d as an ideal 1 -2 OT fu n ctionalit y . In this thesis, we will mainly fo cus on a s ligh t m o dification of 1 -2 OT , w h ic h w e call R andomize d 1 -2 O T (although sender- randomized 1 -2 OT w ould b e a more app ropriate, but also rather length y name). A Rand omized 1 -2 OT , or Rand 1 -2 OT for short, essen tially coincides w ith an ordinary 1 -2 OT , except that the t w o bits B 0 and B 1 are not input by the sender but generated u n iformly at rand om during the proto col an d output to the sen der. This is formalized in Definition 3.1 b elo w. There are t w o m ain justifications for f o cusing on Rand 1 -2 O T . First, an ordinary 1 -2 OT can easily b e constructed from a Rand 1 -2 OT : the sender can u se the rand omly generated B 0 and B 1 to one-time-pad en cr y p t his inpu t bits for the 1 -2 OT , and send the maske d b its to the r eceiv er (as first realized b y Bea v er [Bea95]). F or a formal pro of of this we refer to the fu ll v ersion of [CSS W06]. And second, all information-theoretically secure constructions of 1 -2 OT pr oto cols w e are a w are of in fact do implicitly build a Rand 1 -2 OT and use the ab ov e r eduction to ac hiev e 1 -2 O T . W e f ormalize Rand 1 -2 OT in such a wa y that it minimizes and s implifies as m uc h as p ossible the s ecur it y restrain ts, while at the same time remaining sufficien t for 1 -2 OT . Definition 3.1 ( Rand 1 - 2 OT ) An ε -se cur e R and 1 -2 OT is a pr oto c ol b e- twe en sender S and r e c eiver R , with R having input C ∈ { 0 , 1 } (while S has no input), such that for any distribution of C , the fol lowing pr op erties hold: ε -Correctness: F or honest S and R , S has output B 0 , B 1 ∈ { 0 , 1 } and R has output B C , exc ept with pr ob ability ε . ε -Receiv er-securit y: F or honest R and any (dishonest) ˜ S with output V , δ  P C V , P C · P V  ≤ ε. ε -Sender-securit y: F or honest S and any (dishonest) ˜ R with output W , ther e exists a binary r andom variable D such that δ  P B 1 − D W B D D , P unif · P W B D D  ≤ ε. The condition for receiv er-securit y simp ly says that S learns no information on C , and sender-securit y requires that there exists a c hoice bit D , sup p osed to be C , suc h that wh en giv en the choic e D and the corresp on d ing bit B D , then the other bit, B 1 − D , is completely rand om from R ’s p oint of view. W e w ould lik e to p oint out that the defi nition of Rand 1 -2 OT giv en in [CSSW06] lo ok syntact ically s lightly d ifferen t than our De finition 3.1. How ev er, it is not h ard to see that they are actually equiv alen t. The main difference is that th e definition in [CS SW06] inv olv es an au x iliary input Z , wh ic h is give n to the d ishonest pla y er, and receiv er- and sender-securit y as we defin e them are required to hold c onditione d on Z for any Z . Considering a c onsta nt Z imme- diately pro v es one d irection of the claimed equiv alence, and the other follo ws from the observ atio n th at if receiv er- and send er-securit y as we d efi ne th em 3.3. Characterizing Sender-S ecurity 32 hold f or any distribu tion P B 0 B 1 C (resp ectiv ely P C ), th en they also hold for the conditional distribution P B 0 B 1 C | Z = z (resp ectiv ely P C | Z = z ). The other differen ce is that in [CSS W06], in the cond ition for send er-securit y of Rand 1 -2 OT , B 1 − D is requ ired to b e random and ind ep endent of W , B D , D and C . Th is of course implies our send er-securit y condition (whic h is without C ), but it is also im p lied b y our d efinition as C ma y b e p art of the outp ut W . W e feel that simplifying the defi n itions as we do, without changing their meaning, allo ws for an easier handling. 3.2.2 Randomized 1 -2 OT of Strings In a 1 -2 String OT the sender inp u ts t w o strings of the same length, and the receiv er is allo w ed to learn one an d only one of the tw o. F ormally , for any p ositiv e in teger ℓ , 1 -2 OT ℓ and Rand 1 -2 OT ℓ can b e defin ed along the same lines as 1 -2 O T and Rand 1 -2 OT of bits : the binary random v ariables B 0 and B 1 as w ell as unif in Definition 3.1 are simply replaced b y random v ariables S 0 and S 1 and unif ℓ with range { 0 , 1 } ℓ . 3.3 Characterizing Sender-Securit y 3.3.1 The Case of Bit OT It is w ell kno wn and it follo ws from send er-securit y that in a ( Rand ) 1 -2 OT the receiv er R should in particular learn essentia lly no information on the XOR B 0 ⊕ B 1 of the tw o bits. The follo wing pr op osition shows that this is not only necessary for sender-secur it y but also sufficient . Theorem 3.2 The c ondition for ε -sender-se curity for a Rand 1 -2 O T is satis- fie d for a p articular (p ossibly dishonest) r e c eiver ˜ R with output W if and only if δ  P ( B 0 ⊕ B 1 ) W , P unif · P W  ≤ ε . Before going in to the pro of w hic h is surp risingly simple, consider th e follo w- ing example. Assu me a candidate proto col for Rand 1 -2 OT and a dish on est receiv er ˜ R which is able to output W = 0 if B 0 = 0 = B 1 , W = 1 if B 0 = 1 = B 1 and W = 0 or 1 with p robabilit y 1 / 2 eac h in case B 0 6 = B 1 . Th en, it is easy to see that conditioned on, sa y , W = 0, ( B 0 , B 1 ) is (0 , 0) with p robabilit y 1 2 , and (0 , 1) and (1 , 0) eac h w ith p r obabilit y 1 4 , suc h that the condition on the XOR from Th eorem 3.2 is satisfied. On the other hand, neither B 0 nor B 1 is uni- formly distr ib uted conditioned on W = 0, and it app ears as if the receiv er has some join t information on B 0 and B 1 whic h is forbidden by a ( Rand ) 1 -2 O T . But th at is not so. In deed, the same view can b e obtained when attac king an ide al Rand 1 -2 OT : s ubmit a random bit C to obtain B C and output W = B C . In the light of Definition 3.1, if W = 0 w e can split the ev en t ( B 0 , B 1 ) = (0 , 0) in to t w o d isjoin t subsets (sub ev en ts) E 0 and E 1 suc h that eac h has probabilit y 1 4 , and w e define D by setting D = 0 if E 0 or ( B 0 , B 1 ) = (0 , 1), and D = 1 if E 1 or ( B 0 , B 1 ) = (1 , 0). Then , ob viously , cond itioned on D = d , the b it B 1 − d is uniformly distribu ted, ev en when giv en B d . Th e corresp onding holds if W = 1. 3.3. Characterizing Sender-S ecurity 33 Pro of: The “only if ” implication is well-kno wn an d straight forward. F or the “if ” implication, w e first argue the p erfect case where P ( B 0 ⊕ B 1 ) W = P unif · P W . F or an y v alue w with P W ( w ) > 0, the non-normalized distribu tion P B 0 B 1 W ( · , · , w ) can b e exp r essed as depicted in th e left table of Figure 3.1, w here we write a for P B 0 B 1 W (0 , 0 , w ), b for P B 0 B 1 W (0 , 1 , w ), c f or P B 0 B 1 W (1 , 0 , w ) and d for P B 0 B 1 W (1 , 1 , w ). Note that a + b + c + d = P W ( w ) and , b y assumption, a + d = b + c . Du e to symmetry , w e ma y assume that a ≤ b . W e can then define D by extending P B 0 B 1 W ( · , · , w ) to P B 0 B 1 D W ( · , · , · , w ) as depicted in the righ t t wo tables in Figure 3.1: P B 0 B 1 D W (0 , 0 , 0 , w ) = P B 0 B 1 D W (0 , 1 , 0 , w ) = a , P B 0 B 1 D W (1 , 0 , 0 , w ) = P B 0 B 1 D W (1 , 1 , 0 , w ) = c etc. I m p ortant to realize is that P B 0 B 1 D W ( · , · , · , w ) is ind eed a v alid extension since by assumption c + ( b − a ) = d . a b c d P B 0 B 1 W ( · , · , w ) a a c c P B 0 B 1 D W ( · , · , 0 , w ) 0 b − a 0 b − a P B 0 B 1 D W ( · , · , 1 , w ) Figure 3.1: Distributions P B 0 B 1 W ( · , · , w ) and P B 0 B 1 D W ( · , · , · , w ) It is now ob vious that P B 0 B 1 D W ( · , · , 0 , w ) = 1 2 P B 0 D W ( · , 0 , w ) as well as P B 0 B 1 D W ( · , · , 1 , w ) = 1 2 P B 1 D W ( · , 1 , w ). Th is finishes the p erfect case. Concerning the general case, th e idea is th e same as ab o v e, except that one has to tak e some care in h an d ling the err or parameter ε ≥ 0. As this do es not giv e any new in sigh t, and we anyw a y state and fully pro v e a more general r esu lt in Theorem 3.6, we skip this part of the pro of. 1  3.3.2 The Case of String OT The obvio us question after the previous sectio n is w hether there is a natural generalizat ion of Theorem 3.2 to 1 -2 OT ℓ for ℓ ≥ 2. Note that the str aigh tfor- w ard generalization of the X OR-condition in Th eorem 3.2, requiring that an y receiv er h as no information on the b it-wise XOR of the t wo strings, is clearly to o w eak, and do es not imp ly sender-security f or Rand 1 -2 OT ℓ : for instance the receiv er could kno w the fi rst half of th e first strin g and the second half of the second string. The Characterization Let ℓ b e an arbitrary p ositiv e integer. Definition 3.3 A function β : { 0 , 1 } ℓ × { 0 , 1 } ℓ → { 0 , 1 } is c al le d a non- degenerate linear fu nction (N DLF) if it is of the form β : ( s 0 , s 1 ) 7→ h a 0 , s 0 i ⊕ h a 1 , s 1 i 1 Although the special case ℓ = 1 in Theorem 3.6 is quantitativel y slightly w eaker than Theorem 3.2 . 3.3. Characterizing Sender-S ecurity 34 for two non-zer o a 0 , a 1 ∈ { 0 , 1 } ℓ , i.e., if it is line ar and non-trivial ly dep ends on b oth input strings. Ev en though this is the main notion w e are using, the follo wing more relaxed notion allo ws to mak e some of our claims slight ly stronger. Definition 3.4 A binary function β : { 0 , 1 } ℓ × { 0 , 1 } ℓ → { 0 , 1 } is c al le d 2- balanced if for any s 0 , s 1 ∈ { 0 , 1 } ℓ the functions β ( s 0 , · ) and β ( · , s 1 ) ar e b ala nc e d in the usu al sense, me aning that   { σ 1 ∈ { 0 , 1 } ℓ : β ( s 0 , σ 1 ) = 0 }   = 2 ℓ / 2 and   { σ 0 ∈ { 0 , 1 } ℓ : β ( σ 0 , s 1 ) = 0 }   = 2 ℓ / 2 . The follo wing is easy to see and the pr o of is omitted. Lemma 3.5 Every non-de gener ate line ar function is 2-b alanc e d. In case ℓ = 1, the X OR is a NDLF and th us 2-balanced, and it is the only NDLF and up to add ition of a constant the only 2-balanced function. Based on this notion of non-degenerate linear fu nctions, sender-security of Rand 1 -2 String OT can b e c haracterized as follo ws. Theorem 3.6 The c ondition of ε -sender-se curity for a Rand 1 -2 OT ℓ is satis- fie d for a p articular (p ossibly dishonest) r e c eiver ˜ R with output W if δ  P β ( S 0 ,S 1 ) W , P unif · P W  ≤ ε/ 2 2 ℓ +1 for every NDLF β , and, on the other hand, ε -sender-se curity may b e satisfie d only if δ  P β ( S 0 ,S 1 ) W , P unif · P W  ≤ ε for ev e ry ND LF β . The num b er of NDLFs is exp onentia l in ℓ , n amely (2 ℓ − 1) 2 . Nev ertheless, we sho w in Section 3.4 that this c haracterizatio n turns out to b e v ery usefu l. Th ere, w e will also argue that an exp onenti al o v erhead in ℓ in the sufficien t condition is u na v oidable. The pr o of of Theorem 3.6 also sh o ws that the set of NDLFs forms a minimal set of f unctions among all sets that imply sender-security . In this sense, our charac terization is tigh t. A t fi rst glance, Theorem 3.6 app ears to b e related to the s o-called (information- theoretic) X OR-Lemma, commonly attributed to V azirani [V az86] and nicely explained b y Goldreic h [Gol95], wh ich states that a string is close to u n iform if the XOR of the bits of any non-empty substring are. As far as w e can see, neither follo ws Theorem 3.6 from the X OR-Lemma in an obvious wa y nor can it b e pr o v en b y mo difying the pro of of the X OR-Lemma, as giv en in [Gol95]. F urther m ore, we w ould like to p oint out th at T h eorem 4 in [BCW03] also pro vides a tool to a nalyze sender-securit y of 1 -2 O T proto cols in terms of linear functions; how ev er, the condition that needs to b e s atisfied is muc h stronger than for our T heorem 3.6: it additionally requires that one of the t wo strings is a priori un iformly distributed from the receiv er’s p oin t of view. 2 This differen ce is crucial, b ecause sho wing that one of the t w o str ings is u niform (conditioned on 2 Concretely , it is additionally required t hat every non-trivial parit y of that string is uniform, but b y the XOR-Lemma th is is equiv alen t to the whol e string being uniform. 3.3. Characterizing Sender-S ecurity 35 the receiv er’s view) is u sually tec hnically in v olv ed and sometimes not ev en p os- sible, as the example giv en after Theorem 3.2 sho ws. This is also demonstrated b y the fact that the an alysis in [BCW03] of the consider ed 1 -2 OT pr oto col is tailored to one particular class of priv acy-amplifying h ash functions, and it is stated as an op en problem ho w to prov e th eir construction secure when a differen t class of hash fun ctions is used. Th e condition for Theorem 3.6, on the other hand, is n aturally satisfied for typical constructions of 1 -2 OT proto cols, as w e shall s ee in Secti on 3.4. As a result, Theorem 3.6 allo w s for m uc h simpler and more elegan t securit y p ro ofs for 1 -2 OT protocols, and , as a by-pro duct, allo ws to solv e the op en problem from [BCW03]. W e explain this in detail in Section 3.4, and the in terested reader ma y w ell jump ahead and sa v e the pro of of Theorem 3.6 for later. Pro of of Theorem 3.6 ( “ only if ” part) W e start with the pr o of for the “only if ” part of Theorem 3.6. In fact, a sligh tly stronger statemen t is sho wn, namely that ε -sender-securit y implies δ  P β ( S 0 ,S 1 ) W , P unif · P W  ≤ ε for an y 2-b alanc e d function. According to Definition 3.1, ε -sender-securit y f or Rand 1 -2 O T is satisfied for a receiv er R with outpu t W if there exists a rand om v ariable D with range { 0 , 1 } suc h that 1 2 X w ,d,s 0 ,s 1   P S 1 − D S D D W ( s 1 − d , s d , d, w ) − 2 − ℓ P S D D W ( s d , d, w )   ≤ ε. In order to up p er b ound δ  P β ( S 0 ,S 1 ) W , P unif · P W  = 1 2 X w ,b   P β ( S 0 ,S 1 ) W ( b, w ) − 1 2 P W ( w )   w e expand the terms on the righ t hand side as follo ws. P β ( S 0 ,S 1 ) W ( b, w ) = X d P β ( S 0 ,S 1 ) DW ( b, d, w ) = X d X s d ,s 1 − d β ( s 0 ,s 1 )= b P S 1 − D S D D W ( s 1 − d , s d , d, w ) and P W ( w ) = X d X s d P S D D W ( s d , d, w ) = X d 2 − ℓ +1 · X s d ,s 1 − d β ( s 0 ,s 1 )= b P S D D W ( s d , d, w ) where the last equalit y holds b ecause there are 2 ℓ − 1 v alues f or s 1 − d suc h that β ( s 0 , s 1 ) = b , as β is a 2-balanced function. Using those t w o expansions we 3.3. Characterizing Sender-S ecurity 36 conclude that δ  P β ( S 0 ,S 1 ) W , P unif · P W  ≤ 1 2 X w ,b X d X s d ,s 1 − d β ( s 0 ,s 1 )= b   P S 1 − D S D D W ( s 1 − d , s d , d, w ) − 2 − ℓ P S D D W ( s d , d, w )   = 1 2 X w ,d,s 0 ,s 1   P S 1 − D S D D W ( s 1 − d , s d , d, w ) − 2 − ℓ P S D D W ( s d , d, w )   ≤ ε. where the first inequalit y follo ws follo ws f r om the ab o v e expansions and the triangle inequalit y and the last inequalit y is our initial assumption.  The “if ” part, w h ic h is the inte resting direction, is prov en b elow. The Case ℓ = 2 W e feel that in order to under s tand the pro of of Theorem 3.6, it is usefu l to first consider the case ℓ = 2. Let u s fo cus on trying to dev elop a cond ition that is sufficien t for p erfe ct send er -secur it y . Fix an arbitrary output w , and consider an arbitrary n on-normalized probabilit y distribution P S 0 S 1 W ( · , · , w ) of S 0 and S 1 when W = w . Th is is depicted in the left table of Figure 3. 2, where w e wr ite a for P S 0 S 1 W (00 , 00 , w ), b for P S 0 S 1 W (00 , 01 , w ), etc. W e ma y assume that a ≤ b, c, d . W e no w extend this distribu tion to P S 0 S 1 D W ( · , · , · , w ) sim ilar as in the pro of of Theorem 3.2. This is depicte d in the tw o righ t tables in Figure 3.2. W e v erify w hat conditions P S 0 S 1 W ( · , · , w ) must satisfy suc h that P S 0 S 1 D W is indeed a v alid extension, i.e., that P S 0 S 1 D W ( · , · , 0 , w ) + P S 0 S 1 D W ( · , · , 1 , w ) = P S 0 S 1 W ( · , · , w ). a b c d e f g h i j k l m n o p P S 0 S 1 W ( · , · , w ) a a a a e e e e i i i i m m m m P S 0 S 1 D W ( · , · , 0 , w ) 0 b − a c − a d − a 0 b − a c − a d − a 0 b − a c − a d − a 0 b − a c − a d − a P S 0 S 1 D W ( · , · , 1 , w ) Figure 3.2: Distrib utions P S 0 S 1 W ( · , · , w ) and P S 0 S 1 D W ( · , · , · , w ) F or instance, lo oking at the second row and second column w e get equation e + ( b − a ) = f . Altoget her, we get the follo wing sys tem of equations. b + e = a + f b + i = a + j b + m = a + n c + e = a + g c + i = a + k c + m = a + o d + e = a + h d + i = a + l d + m = a + p 3.3. Characterizing Sender-S ecurity 37 Note that if all these equations d o hold for an y w , then P S 0 S 1 D W ( · , · , · , · ) is we ll defined and satisfies P S 0 S 1 D W ( · , · , 0 , · ) = 1 4 P S 0 D W ( · , 0 , · ) and P S 0 S 1 D W ( · , · , 1 , · ) = 1 4 P S 1 D W ( · , 1 , · ), in other w ords, p er f ect sender-securit y holds. The idea now is to sh o w that the ab ov e equatio n system is equ iv alen t to an- other equation system, in wh ic h every equation exp resses that a certain NDLF applied to S 0 and S 1 is uniformly distributed when W = w , whic h holds b y assumption. F or example, by add ing all the equations in the origi nal system w h ile taking ev ery second equ ation with negativ e sign, one gets the equation b + d + e + g + j + l + m + o = a + c + f + h + i + k + n + p . Define th e fu nction β : { 0 , 1 } 2 × { 0 , 1 } 2 → { 0 , 1 } as follo ws. Let β ( s 0 , s 1 ) b e 0 if the entry which corresp onds to ( s 0 , s 1 ) in the left table in Figure 3.2 app ears on the left hand side of the abov e equ ation, and else w e let β ( s 0 , s 1 ) b e 1. Then the ab o v e equation simply sa ys that β ( S 0 , S 1 ) = 0 w ith the same probabilit y as β ( S 0 , S 1 ) = 1 (when W = w ). Note that it is crucial that in th e ab o v e equation ev ery v ariable a u p to p occurs with multiplici t y exactly 1. By comparing the f u nction tables, it is n o w easy to verify that β coincides with the function ( s 0 , s 1 ) 7→ s 02 ⊕ s 12 , where s i 2 denotes the second co ord inate of s i ∈ { 0 , 1 } 2 , th us is a NDLF. One can no w sho w (and w e are going to do this b elo w f or an arbitrary ℓ ) that th er e are enough su c h equ ations, co rresp onding to NDLFs, such that these equations imply the original ones. This implies th at if β ( S 0 , S 1 ) is distributed uniformly and indep endently of W for ev ery NDLF β , then the original equ ation system is satisfied (for any w ), and th us P S 0 S 1 D W is w ell-defined. Pro of of Theorem 3.6 ( “ if ” part). First, w e consider the p erfect case: if P β ( S 0 ,S 1 ) W e qu als P unif · P W for ev ery NDLF β , then send er-securit y for Rand 1 -2 O T ℓ holds p erf ectly . The Perfect Case : Since the case ℓ = 1 is already settled, w e assu me that ℓ ≥ 2. W e generalize the idea from the case ℓ = 2. The main issu e will b e to transform the equations guarante ed by th e assu mption on the linear functions in to th e ones r equired for P S 0 S 1 D W ( · , · , 0 , w ) + P S 0 S 1 D W ( · , · , 1 , w ) = P S 0 S 1 W ( · , · , w ). Fix an arbitrary output w of the receiv er, and consider the non-normalized probabilit y distribution P S 0 S 1 W ( · , · , w ). W e use th e v ariable p s 0 ,s 1 to r efer to P S 0 S 1 W ( s 0 , s 1 , w ), an d we wr ite o for the all-zero string (0 , . . . , 0) ∈ { 0 , 1 } ℓ . W e assume th at p o , o ≤ p o ,s 1 for an y s 1 ∈ { 0 , 1 } ℓ ; w e show later th at we ma y do so. W e extend this distribution to P S 0 S 1 D W ( · , · , · , w ) by setting P S 0 S 1 D W ( s 0 , s 1 , 0 , w ) = p s 0 , o and P S 0 S 1 D W ( s 0 , s 1 , 1 , w ) = p o ,s 1 − p o , o (3.1) for any strings s 0 , s 1 ∈ { 0 , 1 } ℓ , and we collect the equations resu lting fr om the condition that P S 0 S 1 W ( · , · , w ) = P S 0 S 1 D W ( · , · , 0 , w ) + P S 0 S 1 D W ( · , · , 1 , w ) needs to b e satisfied: for any t w o s 0 , s 1 ∈ { 0 , 1 } ℓ \ { o } p s 0 , o + p o ,s 1 = p o , o + p s 0 ,s 1 . (3.2) 3.3. Characterizing Sender-S ecurity 38 If all these equations do hold f or an y w , then as in the case o f ℓ = 1 or ℓ = 2, the random v ariable D is w ell defi ned and P S 1 − D S D W D = P unif ℓ · P S D W D holds, since P S 0 S 1 D W ( s 0 , s 1 , 0 , w ) d o es not d ep end on s 1 and P S 0 S 1 D W ( s 0 , s 1 , 1 , w ) not on s 0 . W e pro ceed b y sho wing that the equations pro vided b y the assumed uni- formit y of β ( S 0 , S 1 ) for an y β imply the equations give n by (3.2). Consid er an arb itrary pair a 0 , a 1 ∈ { 0 , 1 } ℓ \ { o } and let β b e the asso ciated NDLF, i.e., suc h th at β ( s 0 , s 1 ) = h a 0 , s 0 i ⊕ h a 1 , s 1 i . By assumption, β ( S 0 , S 1 ) is uniformly distributed, in dep end en t of W . T hus, for an y fi x ed w , this can b e exp r essed as X σ 0 ,σ 1 : h a 0 ,σ 0 i = h a 1 ,σ 1 i p σ 0 ,σ 1 = X σ 0 ,σ 1 : h a 0 ,σ 0 i6 = h a 1 ,σ 1 i p σ 0 ,σ 1 , (3.3) where b oth summations are o v er all σ 0 , σ 1 ∈ { 0 , 1 } ℓ sub j ect to the indicated resp ectiv e p rop erties. Recall, that this equalit y h olds for any p air a 0 , a 1 ∈ { 0 , 1 } ℓ \ { o } . Thus, for fi x ed s 0 , s 1 ∈ { 0 , 1 } ℓ \ { o } , if we sum ov er all such pairs a 0 , a 1 sub j ect to h a 0 , s 0 i = h a 1 , s 1 i = 1, w e get the equ ation X a 0 ,a 1 : h a 0 ,s 0 i = h a 1 ,s 1 i =1 X σ 0 ,σ 1 : h a 0 ,σ 0 i = h a 1 ,σ 1 i p σ 0 ,σ 1 = X a 0 ,a 1 : h a 0 ,s 0 i = h a 1 ,s 1 i =1 X σ 0 ,σ 1 : h a 0 ,σ 0 i6 = h a 1 ,σ 1 i p σ 0 ,σ 1 , whic h, after re-arranging th e terms of the su m mations, leads to X σ 0 ,σ 1 X a 0 ,a 1 : h a 0 ,s 0 i = h a 1 ,s 1 i =1 h a 0 ,σ 0 i = h a 1 ,σ 1 i p σ 0 ,σ 1 = X σ 0 ,σ 1 X a 0 ,a 1 : h a 0 ,s 0 i = h a 1 ,s 1 i =1 h a 0 ,σ 0 i6 = h a 1 ,σ 1 i p σ 0 ,σ 1 . (3.4) W e w ill n o w argue that, u p to a constan t m ultiplicativ e f actor, equation (3.4) coincides with equation (3.2). First, it is straightforw ard to verify that the v ariables p o , o and p s 0 ,s 1 o ccur only on the left han d s ide, b oth with m ultiplicit y 2 2( ℓ − 1) (the n umb er of pairs a 0 , a 1 suc h that h a 0 , s 0 i = h a 1 , s 1 i = 1), whereas p s 0 , o and p o ,s 1 only o ccur on the right hand side, with the same multi plicit y 2 2( ℓ − 1) . No w, w e argue that any other p σ 0 ,σ 1 equally often app ears on the righ t and on the left hand side, and th us cancel out. Note that the set of pairs a 0 , a 1 , o v er whic h the su mmation ru ns on the left r esp ectiv ely the right hand side, can b e u ndersto o d as the set of solutions to a binary non-homogeneous linear equations system:   s 0 0 0 s 1 σ 0 σ 1    a 0 a 1  =   1 1 0   resp ectiv ely   1 1 1   . Also note that the tw o linear equ ation systems consist of three equations and in v olv e at least 4 v ariables, b ecause a 0 , a 1 ∈ { 0 , 1 } ℓ and ℓ ≥ 2. Therefore, using basic linear algebra, one is tempted to conclude that they b oth hav e solutions, and, b ecause they hav e th e same homogeneous part, they hav e the same n umber of solutions, equal to the num b er of homogeneous solutions. Ho w- ev er, this is only guaran teed if the matrix defining the homogeneous part has 3.3. Characterizing Sender-S ecurity 39 full rank. In our situation, this is precisely the case if and only if ( σ 0 , σ 1 ) 6∈ { ( o , o ) , ( s 0 , o ) , ( o , s 1 ) , ( s 0 , s 1 ) } , wh ere those four exceptions h a v e already b een treated ab ov e. It follo ws th at th e equations (3.3), w hic h are guarantee d by assumption, imply the equ ations (3.2). It remains to justify the assumption th at p o , o ≤ p o ,s 1 for an y s 1 . In general, w e c ho ose t ∈ { 0 , 1 } ℓ suc h that p o ,t ≤ p o ,s 1 for an y s 1 ∈ { 0 , 1 } ℓ , and we set P S 0 S 1 D W ( s 0 , s 1 , 0 , w ) = p s 0 ,t and P S 0 S 1 D W ( s 0 , s 1 , 1 , w ) = p o ,s 1 − p o ,t , resulting in the equation p s 0 ,t + p o ,s 1 = p o ,t + p s 0 ,s 1 that needs to b e satisfied for s 0 ∈ { 0 , 1 } ℓ \ { o } and s 1 ∈ { 0 , 1 } ℓ \ { t } . This equalit y , though, can b e argued as for equation (3.2 ), wh ic h we did ab o v e, simply by replacing p σ 0 ,σ 1 on b oth s ides of (3.3) b y p σ 0 ,σ 1 ⊕ t (where ⊕ is the bit wise X OR). W e may safely do so: doing a suitable v ariable substitution and using linearit y of the inner pro duct, it is easy to see th at this mo dified equation still expresses uniformit y of β ( S 0 , S 1 ). This concludes the p ro of f or the p er f ect case. The Gene ral Case : No w, w e consider the general case where there exists some ε > 0 su c h that δ  P β ( S 0 ,S 1 ) W , P unif · P W  ≤ 2 − 2 ℓ − 1 ε for any NDLF β . W e use th e observ ations from the p erfect case but additionally k eep trac k of the “error term”. F or any w with P W ( w ) > 0 an d an y NDLF β , set ε w ,β = δ  P β ( S 0 ,S 1 ) W ( · , w ) , P unif · P W ( w )  . Note that P w ε w ,β = δ  P β ( S 0 ,S 1 ) W , P unif · P W  ≤ 2 − 2 ℓ − 1 ε , in dep end en t of β . Fix no w an arb itrary w with P W ( w ) > 0. Then, (3.3) only holds up to an error of 2 ε w ,β , wh ere β is the NDLF asso ciated to a 0 , a 1 . As a consequence, Equation (3.4) only h olds up to an error of 2 P β ε w ,β and thus (3.2) h olds up to an error of δ s 0 ,s 1 = 2 2 2 ℓ − 2 P β ε w ,β , where the sum is o v er th e 2 2 ℓ − 2 functions asso ciated to the pairs a 0 , a 1 with h a 0 , s 0 i = h a 1 , s 1 i = 1. Not e that δ s 0 ,s 1 dep end s on w , but the set of β ’s, o ve r w hic h the s u mmation r uns, do es not. Adding up o v er all p ossible w ’s gives X w δ s 0 ,s 1 = 2 2 2 ℓ − 2 X w X β ε w ,β = 2 2 2 ℓ − 2 X β X w ε w ,β ≤ 2 − 2 ℓ ε . Since (3.2) only h olds approximat ely , P S 0 S 1 D W as in (3.1) is not necessarily a v alid extension, bu t close. This can ob viously b e ov ercome b y ins tead s etting P S 0 S 1 D W ( s 0 , s 1 , 0 , w ) = p s 0 , o ± δ ′ s 0 ,s 1 and P S 0 S 1 D W ( s 0 , s 1 , 1 , w ) = p o ,s 1 − p o , o ± δ ′′ s 0 ,s 1 with suitably chosen δ ′ s 0 ,s 1 , δ ′′ s 0 ,s 1 ≥ 0 with δ ′ s 0 ,s 1 + δ ′′ s 0 ,s 1 = δ s 0 ,s 1 , and with suitably c hosen signs “+” or “ − ”. 3 Using th at ev ery P S 0 S 1 D W ( s 0 , s 1 , 0 , w ) d if- fers f rom p s 0 , o b y at most δ ′ s 0 ,s 1 , it follo ws from a straight forward computation 3 Most of th e time, it probably suffices to correct one of the tw o, say , c ho ose δ ′ s 0 ,s 1 = δ s 0 ,s 1 and δ ′′ s 0 ,s 1 = 0; h o wev er, if for instance p s 0 , o and p o ,s 1 − p o , o are b oth p ositiv e b ut P S 0 S 1 W ( s 0 , s 1 , w ) = 0, then one has to correct b oth. 3.4. Applica tions 40 that δ  P S 1 − D S D D W ( · , · , 0 , w ) , P unif P S D D W ( · , 0 , w )  ≤ P s 0 ,s 1 δ ′ s 0 ,s 1 . The corre- sp ond in g holds for P S 0 S 1 D W ( · , · , 1 , w ). It follo ws that δ  P S 1 − D S D W D , P unif P S D W D  ≤ X w X s 0 ,s 1 ( δ ′ s 0 ,s 1 + δ ′′ s 0 ,s 1 ) = X s 0 ,s 1 X w δ s 0 ,s 1 ≤ ε whic h concludes th e pro of.  3.4 Applications In this section w e will sho w the usefu lness of Th eorem 3.6 for the construction of 1 -2 OT ℓ , b ased on w eak er primitives lik e a n oisy channel or other flav ors of OT . In particular, we w ill s h o w that the redu cibilit y of 1 -2 OT to any w eak er fla v or of OT follo ws as a simple argument usin g Theorem 3.6. 3.4.1 Reducing 1 -2 OT ℓ to Indep endent Rep etitions of W eak 1 -2 OT s Bac kground A great deal of effort has b een put int o constru cting p roto cols for 1 -2 OT ℓ based on p h ysical assumptions lik e v arious mo dels for noisy c hannels [CK88, DKS99, DFMS04, C MW04 ] or a memory b ound ed adv ersary [CCM98, Din01b, DHRS04], as w ell as into reducing 1 -2 OT ℓ to (seemingly) wea ke r fl a v ors of OT , like Rabin OT , 1 -2 XOT , 1 -2 GOT and 1 -2 UOT [Cr´ e87, BC97, Cac98, W ol00, BCW03, CS06, W ul07]. Note that the latter three fla v ors of OT are w eak er than 1 -2 OT in that the d ishonest receiv er has more fr eedom in choos- ing the sort of information he w an ts to get ab out the send er’s in p ut bits B 0 and B 1 : B 0 , B 1 or B 0 ⊕ B 1 in case of 1 -2 X OR-OT (whic h is abb reviated b y 1 -2 XOT ), g ( B 0 , B 1 ) for an arbitrary one-bit-output fun ction g in case of 1 -2 Generalized-OT (1 -2 GOT) , and an arbitrary probabilistic Y with mutual information I ( B 0 B 1 ; Y ) ≤ 1 in case of 1 -2 Universal-OT (1 -2 UOT) . 4 All these reductions of 1 -2 OT to w eak er v ersions follo w a sp ecific con- struction d esign, whic h is also at the core of the 1 -2 OT p roto cols based on noisy c hannels or a memory-b ound ed adv ersary . By rep eated indep en d en t ex- ecutions of the underlyin g primitiv e, S tr an s fers a randomly c hosen bit string X = ( X 0 , X 1 ) ∈ { 0 , 1 } n × { 0 , 1 } n to R suc h that: 1. dep ending on his c hoice bit C , the honest R kn ows either X 0 or X 1 , 2. an y ˜ S has no information on wh ic h part of X R learned, and 3. an y ˜ R has some un certaint y in X . 4 As a matter of fact, reducibility has b een prove n for any b ound on I ( B 0 B 1 ; Y ) strictly smaller than 2. Note th at there is some confusion in the literature in what a Universal OT , UOT is: I n [BC97, W ol00 , BCW03], a UOT takes as inp ut tw o bits and the receiv er is do omed to h a ve at least one bit or any other non- trivial amount of Shannon entrop y on t hem; we den ote this by 1 -2 U OT . Whereas in [Cac98], a UOT takes as inp ut tw o strings and the receiver is doomed to hav e some R´ enyi entrop y of order α > 1 on them. W e ad d ress this latter notion in more detail in Section 3.4.2. 3.4. Applica tions 41 Then, this is co mpleted to a Rand 1 -2 OT b y means of pr iv acy amplificati on (cf. Section 2.5): S samples tw o fu nctions f 0 and f 1 from a t wo- universal class F of hash functions, send s them to R , and outputs S 0 = f 0 ( X 0 ) and S 1 = f 1 ( X 1 ), and R outputs S C = f C ( X C ). Finally , the Rand 1 -2 OT is transformed into an ordinary 1 -2 OT in th e ob vious wa y . Correctness and r eceiv er-securit y of this construction are clear, they follo w immediately fr om 1. and 2. Ho w easy or hard it is to pro ve sender-security dep end s hea vily on the u nderlying primitiv e. In case of Rabin OT it is rather straigh tforw ard. In case of 1 -2 X OT and the other weak er v ersions, this is non- trivial. The p roblem is that since R migh t kn o w X 0 ⊕ X 1 , it is not p ossible to argue that there exists d ∈ { 0 , 1 } suc h th at R ’s u ncertain t y on X 1 − d is large when giv en X d . This, though, would b e necessary in order to finish the pro of b y simply applying th e priv acy amplification theorem (Corollary 2.27). This difficult y is o v ercome in [BC97, BCW03] b y tailoring the pro of to a particu- lar t w o-unive rsal class of hash functions, n amely th e class of all line ar hash functions. Whether the reduction also works for a less restricted class of hash functions is left in [BC97, BCW03] as an op en problem, w hic h we solv e her e as a side r esu lt. Using a smaller class of hash fu nctions wo uld allo w f or instance to reduce the communicat ion complexit y of the proto col. In [CS06], the difficulty is o v ercome by giving up on the s implicit y of the reduction. The cost of tw o-w a y comm unication allo wing for in teractiv e hashing is traded for b etter red uction parameters. W e would lik e to emph asize that these parameters are incomparable to our s, b ecause a d ifferen t reduction is u sed, whereas our approac h pro vides a b etter analysis of the common n on-in teractiv e reductions. The New Approac h W e argue th at, ind ep endent of th e un derlying pr im itive, sender-security fol- lo ws as a simple consequence of Theorem 3.6 , in com bination with a simple observ at ion regarding the comp osition of non-degenerate linear (resp ectiv ely , more general, 2-balanced) f u nctions with strongly t w o-univ ersal hash fun ctions, stated in Prop osition 3.7 b elo w. Recall Definition 2.23 of strong tw o-univ ersalit y . A class F of hash functions from { 0 , 1 } n to { 0 , 1 } ℓ is str ongly two-universal , if for an y distinct x, x ′ ∈ { 0 , 1 } n the tw o random v ariables F ( x ) and F ( x ′ ) are indep end ent and u niformly dis- tributed o v er { 0 , 1 } ℓ , where the random v ariable F represen ts the random c hoice of a function in F . Prop osition 3.7 L et F 0 and F 1 b e two classes of str ongly two-universal hash functions fr om { 0 , 1 } n 0 r esp e ctively { 0 , 1 } n 1 to { 0 , 1 } ℓ , and let β : { 0 , 1 } ℓ × { 0 , 1 } ℓ → { 0 , 1 } b e a 2-b alanc e d function. Consider the class F of al l functions f : { 0 , 1 } n 0 × { 0 , 1 } n 1 → { 0 , 1 } with f ( x 0 , x 1 ) = β ( f 0 ( x 0 ) , f 1 ( x 1 )) wher e f 0 ∈ F 0 and f 1 ∈ F 1 . Then, F is str ongly two-universal. 5 5 It is easy to see that the claim does n ot hold in general for ordinary (as opp osed to strongly) t wo-univ ersal classes: if n 0 = n 1 = ℓ and F 0 and F 1 b oth only contain the identity function id : { 0 , 1 } ℓ → { 0 , 1 } ℓ and t hus are tw o-universa l, then F consisting of the fun ct ion f ( x 0 , x 1 ) = β ( id ( x 0 ) , id ( x 1 )) = β ( x 0 , x 1 ) is not tw o-universal. 3.4. Applica tions 42 Pro of: Fix distinct x = ( x 0 , x 1 ) and x ′ = ( x ′ 0 , x ′ 1 ) in { 0 , 1 } n 0 × { 0 , 1 } n 1 . As- sume without loss of generalit y that x 1 6 = x ′ 1 . Fix f 0 ∈ F 0 , and set s 0 = f 0 ( x 0 ) and s ′ 0 = f 0 ( x ′ 0 ). By assumption on F 1 , th e random v ariables F 1 ( x 1 ) and F 1 ( x ′ 1 ) are indep end en t and uniformly distributed ov er { 0 , 1 } ℓ , wh ere F 1 rep- resen ts the random c hoice for f 1 ∈ F 1 . By the assump tion on β , th is implies that β ( f 0 ( x 0 ) , F 1 ( x 1 )) and β ( f 0 ( x ′ 0 ) , F 1 ( x ′ 1 )) are indep endent and u n iformly dis- tributed o v er { 0 , 1 } . Th is h olds no matter ho w f 0 is c hosen, and thus p ro v es the claim.  No w, briefly , sender-security for a construction as sketc hed ab o v e can b e argued as f ollo ws: The only restriction is that F needs to b e str ongly t w o- unive rsal. F rom the indep en den t rep etitions of the underlying weak OT ( Ra- bin OT , 1 -2 X OT , 1 -2 GOT or 1 -2 UOT ) it follo ws that ˜ R has “high” collision en trop y in X . Hence, for an y NDLF β , w e can apply the pr iv acy-amplification Theorem 2.27 with the str ongly tw o-univ ersal hash function β ( f 0 ( · ) , f 1 ( · )) and argue that β ( f 0 ( X 0 ) , f 1 ( X 1 )) is close to uniform for randomly chosen f 0 and f 1 . Sender-security then follo ws immediately from Theorem 3.6. W e sa v e the quant itativ e analysis (Theorem 3.8) for next section, where w e consider a reduction of 1 -2 O T to the weak est kind of O T : to one execution of a UOT . Based on this, we compare in Section 3.4.3 the qualit y of the an alysis of the ab o v e reductions based on T h eorem 3.6 with the resu lts in [BCW03]. It turns out that our analysis is tigh ter for 1 -2 GOT and 1 -2 UOT , whereas the analysis in [BCW03] is tighte r for 1 -2 X OT ; b ut in all cases, our analysis is m uc h simpler and , w e b eliev e, more elegan t. 3.4.2 Reducing 1 -2 OT ℓ to One Execution of UOT In this section, we use the definition and some elemen tary p rop erties of R´ en yi en trop y introd uced in Section 2.4.1. Univ ersal Oblivious T ransfer Probably the weak est fla v or of OT is the Universal OT ( UOT ) as it was in tro- duced b y Cac hin in [Cac98], in that it give s the receiv er the most freedom in getting information on the string X . F ormally , for a finite s et X and parame- ters α > 1 (allo win g α = ∞ ) and r > 0, an ( α, r ) -UOT ( X ) works as follo ws: the sender inpu ts x ∈ X , and the receiv er ma y choose an arbitrary conditional probabilit y distribution P Y | X with the only restriction that for a uniformly dis- tributed X it m ust satisfy H α ( X | Y ) ≥ r . The receiv er then gets as outpu t y , sampled according to th e distrib ution P Y | X ( ·| x ), wh ereas the sender gets no information on the receiv er’s c hoice for P Y | X . Note that a 1 -2 UOT is a limit case of this kind of UOT since “ 1 -2 UOT = (1 , 1) -UOT ( { 0 , 1 } 2 )”. The crucial prop erty of su ch an UOT is that the inpu t is not r estricted to t w o bits, but may b e t w o bit- strings ; th is p oten tially allo ws to reduce 1 -2 OT to one exec ution of a UOT , rather than to man y indep endent executions of the same primitiv e as f or the 1-2 flav ors of OT men tioned ab o v e. Indeed, follo wing the design principle discussed in Section 3.4.1, it is straigh tforw ard to come 3.4. Applica tions 43 up with a candidate p roto col for 1 -2 OT ℓ whic h uses one execution of a ( α, r ) - UOT ( X ) with X = { 0 , 1 } n × { 0 , 1 } n . The proto col is giv en in Figure 3.3, wher e F is a strongly t w o-univ ersal class of hash functions fr om { 0 , 1 } n to { 0 , 1 } ℓ . OT2UOT ( c ) : 1. S and R r u n ( α, r ) -UOT ( X ): S inpu ts a random x = ( x 0 , x 1 ) ∈ X = { 0 , 1 } n × { 0 , 1 } n , R inputs P Y | X with P Y | X ( x ′ c | ( x ′ 0 , x ′ 1 )) = 1 for any ( x ′ 0 , x ′ 1 ), and as a r esult R obtains y = x c . 2. S samples indep endent random f 0 , f 1 ∈ F , sends f 0 and f 1 to R , and outputs s 0 = f 0 ( x 0 ) and s 1 = f 1 ( x 1 ). 3. R computes and outputs s c = f c ( y ). Figure 3.3: Proto col OT2UOT for Rand 1 -2 OT ℓ . In [C ac98] it is clai med that, for a pp r opriate p arameters, proto col OT 2UOT is a secure Rand 1 -2 OT ℓ , resp ectiv ely , the resulting pr otocol for 1 -2 OT is secure. Ho we ve r, we argue b elo w th at the pro of giv en is not correct and it is not o bvious how to fix it. In Theorem 3.8 w e then sho w that its securit y follo w s easily from Theorem 3.6. A Fla w in t he Security Proof In [Cac98] the securit y of p r oto col OT2UOT is argued as follo ws. Using rather complicated sp oiling-know le dge te chniques , it is shown that, co nditioned on the receiv er’s outpu t (whic h w e su ppress to simplify the notation) at least one out of H ∞ ( X 0 ) and H ∞ ( X 1 | X 0 = x 0 ) is “large” (for any x 0 ), and , similarly , at least one out of H ∞ ( X 1 ) and H ∞ ( X 0 | X 1 = x 1 ). Since collision entrop y is lo w er b ound ed by min-entrop y , it then follo ws from the p riv acy amplification theorem that at least one out of H( F 0 ( X 0 ) | F 0 ) and H( F 1 ( X 1 ) | F 1 , X 0 = x 0 ) is close to ℓ , and similarly , one out of H( F 1 ( X 1 ) | F 1 ) and H( F 0 ( X 0 ) | F 0 , X 1 = x 1 ). It is then claimed that this p ro v es OT2UOT sec ure. W e argue that th is v ery last implication is not correct. Indeed, what is pro v en ab out the entrop y of F 0 ( X 0 ) and F 1 ( X 1 ) do es not exclude the p ossibilit y that b oth en tropies H( F 0 ( X 0 ) | F 0 ) and H ( F 1 ( X 1 ) | F 1 ) are maximal, bu t that H( F 0 ( X 0 ) ⊕ F 1 ( X 1 ) | F 0 , F 1 ) = 0. T h is w ould allo w the r eceiv er to learn the bit wise XOR S 0 ⊕ S 1 , whic h is clearly forb idden by the condition of sen d er-securit y . Also note that the p ro of do es not use the fact that the t w o f u nctions F 0 and F 1 are c hosen indep e ndently . Ho we v er, if they are c hosen to b e th e same, then th e p roto col is clearly ins ecure: if the receiv er asks for Y = X 0 ⊕ X 1 , and if F is a class of line ar t w o-unive rsal hash fun ctions, then ˜ R obvio usly learns S 0 ⊕ S 1 . 3.4. Applica tions 44 Reducing 1 -2 OT ℓ to UOT The follo wing theorem guaran tees the security of OT2UOT f or an appropr iate c hoice of the parameters. Th e only restrictio n w e hav e to make is that F needs to b e a str ongly t w o-unive rsal class of hash fun ction. Theorem 3.8 L et F b e a strongly two-universal class of hash functions fr om { 0 , 1 } n to { 0 , 1 } ℓ . Then OT2UOT r e duc es a 2 − κ -se cur e Rand 1 -2 O T ℓ to a p er- fe c t (2 , r ) -UOT ( { 0 , 1 } 2 n ) with n ≥ r ≥ 4 ℓ + 2 κ + 1 . Using the b ounds fr om Lemma 2.9 on the differen t orders of R ´ en yi ent ropy , the reducibilit y of 1 -2 OT ℓ to ( α, r ) -UOT ( X ) follo ws imm ediately for any α > 1. Informally , sender-security of the proto col OT2UOT is argued as for the re- duction of 1 -2 OT to Rabin OT , 1 -2 X OT etc., discussed in Section 3.4.1, simp ly b y using Prop osition 3.7 in com bination with the p riv acy amp lification Th eo- rem 2.27 , and applyin g Theorem 3.6. The formal pro of giv en b elo w additionally k eeps trac k of the error term. F rom this pro of it also b ecomes clear that the exp onent ial (in ℓ ) ov erhead in Th eorem 3.6 is una v oidable. I n deed, a s ub-exp onential ov erh ead w ould allo w ℓ in Theorem 3.8 to b e sup er-linear in n , whic h of course is nonsense. Pro of: By th e defin ition of cond itional co llision en trop y , we ha v e that for a ll y , H 2 ( X | Y = y ) ≥ r ≥ 4 ℓ + 2 κ + 1. Fix an arb itrary y and consider an y NDLF β : { 0 , 1 } ℓ × { 0 , 1 } ℓ → { 0 , 1 } . Let F 0 and F 1 b e the rand om v ariables that represent the random choic es of f 0 and f 1 , and set B = β ( F 0 ( X 0 ) , F 1 ( X 1 )). In com b ination with Prop osition 3.7, priv acy amplifi cation (Corollary 2.27) guaran tees that δ  P B F 0 F 1 | Y = y , P unif P F 0 F 1 | Y = y  ≤ 2 − 1 2 (H 2 ( X | Y = y )+1) ≤ 2 − 1 2 (4 ℓ +2 κ +2) = 2 − 2 ℓ − κ − 1 . It no w follo ws th at δ  P β ( S 0 ,S 1 ) W , P unif · P W  = δ  P B F 0 F 1 Y , P unif P F 0 F 1 Y  = X y δ  P B F 0 F 1 | Y = y , P unif P F 0 F 1 | Y = y  P Y ( y ) ≤ 2 − κ / 2 2 ℓ +1 . Sender-security as claimed now follo ws from Theorem 3.6.  The min -entrop y sp litting Lemma 2.15 and a larger (not necessarily strongly) t w o-univ ersal cla ss of hash functions can alternativ ely b e used to sho w the secu- rit y of the r eduction proto col OT2UOT without th e use of NDLFs. W e d o this here for illustration purp oses b ecause the same te c hniqu e is used in the secur it y pro of of 1 -2 OT in the b ounded-quantum-storage mo del in C hapter 6. After the execution of a p erfect ( ∞ , r ) -UOT ( { 0 , 1 } 2 n ), we h a v e H ∞ ( X 0 X 1 | Y ) ≥ r and Lemma 2.15 yiel ds th e existence of a r andom v ariable D ∈ { 0 , 1 } su c h that H ∞ ( X 1 − D D | Y ) ≥ r / 2 an d therefore also H ∞ ( X 1 − D D S D | Y ) ≥ r / 2. By the c hain r ule (Lemma 2.12) and setting ε : = 2 − κ − 1 , w e get H ε ∞ ( X 1 − D | D S D Y ) ≥ r / 2 − 1 − ℓ − κ − 1. Hence to get a 2 − κ -secure Rand 1 -2 OT ℓ via the priv acy am- plification theorem (C orollary 2.2 5), w e need r / 2 − ℓ − κ − 2 > 2 κ + ℓ wh ich give s sligh tly worse parameters than in Theorem 3.8, namely n ≥ r ≥ 4 ℓ + 4 κ + 4. 3.4. Applica tions 45 3.4.3 Quan titativ e Comparisons T o R elated W ork Subsequ ent to [DFSS 06], W u llsc hleger imp ro v ed the min-entrop y splitting te c h- nique describ ed in the la st paragraph . In [W ul07], it is sho wn that the protocol OT2UOT redu ces a 2 − κ -secure Rand 1 -2 OT ℓ to a p erfect ( ∞ , r ) -UOT ( { 0 , 1 } 2 n ) if n ≥ r ≥ 2 ℓ + 6 κ + 6 log (3). So, Rand 1 -2 OT ℓ of strings of length ℓ roughly half of the receiv ers min-en trop y r can b e ob tained, which is asymptotically op- timal for th is r eduction-proto col. T ec hnically , th e resu lt is essentially obtained b y using the min-en trop y splitting app roac h sketc h ed at the end of last section and a more careful case distin ction. The random v ariable D ∈ { 0 , 1 } p oint ing to the “known” string X D is basically defi n ed as in Lemma 2.15, but for the case wh en b oth X 0 , X 1 ha v e high min-entrop y , a n ew distribute d left-o v er hash lemma is us ed to sho w that b oth S 0 and S 1 are close to un iform and therefore close to indep end en t (and hence, the p oin ter D can b e c hosen arbitrarily in this case). In the follo wing, w e compare the simple red u ction of 1 -2 O T ℓ to n executions of 1 -2 XOT , 1 -2 GOT and 1 -2 UOT , resp ectiv ely , usin g our analysis based on Theorem 3.6 together with the quan titativ e statemen t giv en in Theorem 3.8, with the results ac hiev ed in [BCW03 ]. 6 The qu ality of th e analysis of a reduction is giv en by the r e duction p ar ameters c len , c sec and c const suc h that the 1 -2 OT ℓ is guaran teed to b e 2 − κ -secure as long as n ≥ c len · ℓ + c sec · κ + c const . The smaller these constants are, th e b etter is the analysis of the r eduction. The comparison of these parameters is giv en in Figure 3.4. W e fo cus o n c len and c sec since c const is not really relev an t, unless ve ry large. 1 -2 X OT 1 -2 GOT 1 -2 UOT c len c sec c len c sec c len c sec BCW [BCW03] 2 2 4.8 4.8 14.6 14.6 this w ork [DFSS06] 4 2 4 3 13.2 10.0 subsequent [W ul07] 2 6 2 7 6.7 23.3 Figure 3.4: C omparison of the redu ction p arameters. The parameters in the first line can easily b e extracted from Theorems 5, 7 and 9 of [BCW03], w here in T heorem 9 p e ≈ 0 . 19. The p arameters in the second line co rresp onding to the reduction to 1 -2 X OT follo w immediate ly from Theorem 3.8, u sing the fact that in one execution of a 1 -2 X OT , the receiv er’s conditional collision entrop y on the sender’s t wo input bits is at least 1. Determining the parameters of the reductions to 1 -2 GOT and 1 -2 UOT requires a little more w ork. W e first determine the aver age conditional min- en trop y ˜ H ∞ ( X | Y ) of one instance of 1 -2 GOT and 1 -2 UOT . In the case of 1 -2 GOT , ˜ H ∞ ( X | Y ) can easily b e seen to b e at least 1 (for example b y in- 6 As mentioned earlier, these results are incomparable to t he parameters achiev ed in [CS06], where i nter active reduct ions are used. 3.5. Extension t o 1 - n OT ℓ 46 sp ection of T able 2 in [BCW03]). F or one execution of 1 -2 UOT , the r eceiv er’s a v erage Shannon en tropy is at least 1. Therefore, it follo ws fr om F ano’s In - equalit y (Lemma 2.11 ) that his av erage guessing p robabilit y is at most 1 − p e with p e ≈ 0 . 19 as ab o ve , and thus h is a v erage conditional min-entrop y is at least − log(1 − p e ) ≈ 0 . 3. W e use Lemma 2.8 to lo w er b ound the (regular) conditional m in-en trop y H ∞ ( X | Y = y ) except with probabilit y 2 − κ − 1 and use Theorem 3.8 with securit y parameter 2 − κ − 1 whic h together yields a 2 − κ secure Rand 1 -2 OT ℓ . T o ap p ly Theorem 3.8, we require H 2 ( X | Y = y ) ≥ H ∞ ( X | Y = y ) ≥ 4 ℓ + 2 κ + 3 and to obtain this by Lemma 2.8, w e need ˜ H ∞ ( X | Y ) ≥ 4 ℓ + 3 κ + 4. This yields c len = 4 , c sec = 3 for 1 -2 GOT and c len ≈ 4 / 0 . 3 and c sec ≈ 3 / 0 . 3 for 1 -2 UOT . The deriv ation of the parameters for [W u l07] is analogous. 3.5 Extension to 1 - n OT ℓ In this section we extend our c haracterizatio n of sender-securit y of Rand 1 -2 OT to Rand 1 - n OT . W e use the follo wing n otation. F or a sequence of rand om v ariables S 0 , S 1 , . . . , S n − 1 and in dices i, j ∈ { 0 , . . . , n − 1 } , w e den ote b y S i,j the sequence of v ariables { S k : k ∈ { 0 , . . . , n − 1 } \ { i, j }} w ith all indices except i and j . Similarly , S i denotes all v ariables b ut the i th. Definition 3.9 ( Rand 1 -n OT ℓ ) A n ε -se cur e Rand 1 - n O T is a pr oto c ol b e- twe en S and R , with R having input C ∈ { 0 , 1 , . . . , n − 1 } (while S has no input), such that for any distribution of C , the fol lowing pr op e rties hold: ε -Correctness: F or honest S and R , S has output S 0 , S 1 , . . . , S n − 1 ∈ { 0 , 1 } ℓ and R outputs S C , exc ept with pr ob ability ε . ε -Receiv er-securit y: If R is honest then for any (p ossibly dishonest) ˜ S with output V , δ  P C V , P C · P V  ≤ ε. ε -Sender-securit y: If S is honest then for any (p ossibly disho nest) ˜ R with output W , ther e exists a r andom variable D with r ange { 0 , 1 , . . . , n − 1 } such that δ  P S D W S D D , P n − 1 unif ℓ · P W S D D  ≤ ε. Analogous to the 1 -2 OT -case w e wan t for sender-security that there exists a c hoice D , suc h that when giv en the corresp ond ing string (or bit) S D all the other strings (or b its) lo ok completely rand om from R ’s p oint of view. Recall that f or the c haracterizati on of sender-securit y in the case of 1 -2 OT , it is su fficien t that P β ( S 0 ,S 1 ) W = P unif · P W for every NDLF β . In a fi r st attempt one migh t try to c haracterize th e sender-securit y of 1 - n OT usin g linear functions β that non-trivially dep end on n arguments. In the case of 1 - 3 O T of bits, the only linear function of this kind is the X OR of the three bits, b ut it 3.5. Extension t o 1 - n OT ℓ 47 can b e easily ve rified that the requiremen t that B 0 ⊕ B 1 ⊕ B 2 is u niform do es not imply send er-securit y in the sense defi n ed ab o v e. Instead, as we will see b elo w, suffi cient requiremen ts are that the X OR of every p air of b its is uniform when given the value of the thir d . Theorem 3.10 The c ondition for ε -sender-se c urity for a Rand 1 - n OT ℓ is sat- isfie d for a p articular (p ossibly dishon est) r e c eiver ˜ R with output W , if for al l i 6 = j ∈ { 0 , . . . , n − 1 } δ  P β ( S i ,S j ) W S i,j , P unif · P W S i,j  ≤ ν for every NDLF β , wher e ν = ε/ (2 2 ℓ n ( n − 1)) . Pro of: W e first consider and pr o v e the p erfect case. The Perfect Case: Lik e in the pr o of of Theorem 3.6, w e fix an out- put w of the r eceiv er and consider the non-normalized probability d istribu- tion P S 0 ...S n − 1 W ( · , . . . , · , w ). W e u se the v ariable p s 0 ,...,s n − 1 to refer to the v alue P S 0 ...S n − 1 W ( s 0 , . . . , s n − 1 , w ) and o for the all-zero string (0 , . . . , 0) ∈ { 0 , 1 } ℓ . W e use b old font to den ote a collect ion of strings s : = ( s 0 , s 1 , . . . , s n − 1 ) ∈ { 0 , 1 } ℓn , and w e write s i for ( s 0 , . . . , s i − 1 , s i +1 , . . . , s n − 1 ), the co llection s without s i . Fi- nally , for a collectio n t = ( t 0 , . . . , t k − 1 ) ∈ { 0 , 1 } ℓk of arb itrary size k , we defin e sets of indices with one (resp ectiv ely tw o) non-zero sub s trings: S 1 ( t ) : = { ( o , . . . , o , t i , o , . . . , o ) : i ∈ { 0 , . . . , k − 1 }} S 2 ( t ) : = { ( o , . . . , o , t i , o , . . . , o , t j , o , . . . , o ) : i < j ∈ { 0 , . . . , k − 1 }} where the t i (and t j ) are at i th (and j th) p osition. As in the pro of of Theo- rem 3.6, we assume for the clarit y of exp osition that for all i ∈ { 0 , . . . , n − 1 } and s i ∈ { 0 , 1 } ℓ , it holds that p o ,..., o ≤ p o ,..., o ,s i , o ,..., o (where s i is at p osition i ). F or sym metry reasons, the general case can b e handled along the same lines. W e extend the d istribution P S 0 ...S n − 1 W ( · , . . . , · , w ) similarly to (3.1): for ev ery s ∈ { 0 , 1 } ℓn , w e set P S 0 ...S n − 1 D W ( s 0 , . . . , s n − 1 , 0 , w ) : = p s 0 , o ,..., o , P S 0 ...S n − 1 D W ( s 0 , . . . , s n − 1 , 1 , w ) : = p o ,s 1 , o ,..., o − p o ,..., o , . . . P S 0 ...S n − 1 D W ( s 0 , . . . , s n − 1 , n − 2 , w ) : = p o ,...,s n − 2 , o − p o ,..., o , P S 0 ...S n − 1 D W ( s 0 , . . . , s n − 1 , n − 1 , w ) : = p o ,..., o ,s n − 1 − p o ,..., o . In ord er to sho w that this is a v alid extension, we ha v e to show that f or ev ery s ∈ { 0 , 1 } ℓn p s = X t ∈S 1 ( s ) p t − ( n − 1) p o ,..., o . (3.5) If this holds, then the r andom v ariable D is w ell defin ed, and the S D are uni- formly distributed give n D , S D and W . 3.5. Extension t o 1 - n OT ℓ 48 W e n o w sho w th at (3.5) follo ws from the assumed uniformity prop ert y that P β ( S i ,S j ) W | S i,j = s i,j = P unif · P W | S i,j = s i,j for ev ery non-d egenerate linear function β and any i 6 = j . This is d one by ind uction on n . The case n = 2 is co v ered by the pro of of T heorem 3.6, and b y indu ction assumption we may assume that it also h olds for n − 1. L et us fi x some s ∈ { 0 , 1 } ℓn and i ∈ { 0 , . . . , n − 1 } . It is easy to see that the assumed uniform it y prop er ty o n S 0 , . . . , S n − 1 , W imp lies the corresp onding uniformity prop ert y on S i , W when conditioning on S i = s i , and therefore, by ind u ction assump tion and “multiplying out the conditioning”, p s = X t p t − ( n − 2) p o ,..., o ,s i , o ,..., o . (3.6) where the sum is o v er all t ∈ { 0 , 1 } ℓn with t i = s i and t i ∈ S 1 ( s i ). Su mming all the equations o ve r i ∈ { 0 , . . . , n − 1 } yields n · p s = 2 X t ∈S 2 ( s ) p t − ( n − 2) X t ∈S 1 ( s ) p t . (3.7) By a similar reasoning w e can also d eriv e from the case n = 2 that equations of t yp e (3.2) hold co nditioned on the ev en t that all but t w o of the S i ’s are ze ro. More formally , w e ha v e that for all i < j ∈ { 0 , . . . , n − 1 } , p o ,..., o ,s i , o ,..., o ,s j , o ,..., o = p o ,..., o ,s i , o ,..., o + p o ,..., o ,s j , o ,..., o − p o ,..., o . (3.8) Summing these equations ov er all i < j ∈ { 0 , . . . , n − 1 } yields X t ∈S 2 ( s ) p t = ( n − 1) X t ∈S 1 ( s ) p t −  n 2  p o ,..., o (3.9) W e conclude b y sub stituting (3.9) in to (3.7) as follo ws n · p s = 2 X t ∈S 2 ( s ) p t − ( n − 2) X t ∈S 1 ( s ) p t = 2   ( n − 1) X t ∈S 1 ( s ) p t −  n 2  p o ,..., o   − ( n − 2) X t ∈S 1 ( s ) p t = n X t ∈S 1 ( s ) p t − n ( n − 1) p o ,. .., o , whic h is equation (3.5) after dividing b y n , and th us finish es the ind uction step and the claim for ε = 0. The General Case: F or the non-zero error case, we follo w the ab o v e argu- men t, bu t k eep trac k of the error. F or tec hnical reasons, w e assume th at the S i ’s are indep endent and u n iformly distributed, and we assume that the assumed uniformity prop ert y with resp ect to NDLFs holds conditioned on S i,j = s ij for any s ij , not j u st on a v erage, i.e., δ  P β ( S i ,S j ) W | S i,j = s ij , P unif · P W | S i,j = s ij  ≤ ν 3.5. Extension t o 1 - n OT ℓ 49 for an y s ij ∈ { 0 , 1 } ℓ ( n − 2) . W e show at the end of the pr o of ho w to argu e in general. W rite δ s =   X t ∈S 1 ( s ) p t − ( n − 1) p o ,..., o − p s   suc h that (3.5) holds up to the error δ s . Note that δ s dep end s on w ; w e also write δ s ( w ) to make this dep end ency exp licit. W e will argue, follo w ing the induction pro of, that X w , s δ s ( w ) ≤ n ( n − 1) · 2 2 ℓ · ν = ε . The pro of can then b e completed analogue to th e pr o of of T heorem 3.6 by “correcting” the v alues for P S 0 ...S n − 1 D W ’s appropriately . By the p ro of of Theorem 3.6, the claime d inequalit y h olds in case n = 2. F or the indu ction step, note th at b y induction assumption, (3.6) holds up to δ s i ( w ) P S i ( s i ) where X w , s i δ s i ( w ) ≤ ( n − 1)( n − 2) · 2 2 ℓ · ν . F urther m ore, from the case n = 2 it follo ws that Equ ation (3.8) holds up to δ s i ,s j ( w ) P S ij ( o · · · o ), wh ere X w ,s i ,s j δ s i ,s j ( w ) ≤ 2 2 ℓ +1 · ν and, b y the additional assumption p osed on the S i ’s, P S ij ( o · · · o ) = 2 − ( n − 2) ℓ . It follo ws that (3.5) holds up to δ s = 1 n  X i δ s i P S i ( s i ) + 2 X i

Original Paper

Loading high-quality paper...

Comments & Academic Discussion

Loading comments...

Leave a Comment