4.6 Article

Geometry of Banach Spaces: A New Route Towards Position Based Cryptography

Journal

COMMUNICATIONS IN MATHEMATICAL PHYSICS
Volume 394, Issue 2, Pages 625-678

Publisher

SPRINGER
DOI: 10.1007/s00220-022-04407-9

Keywords

-

Funding

  1. MICINN [MTM2017-88385-P, SEV-2015-0554]
  2. Comunidad de Madrid [S2018/TCS-4342]
  3. European Research Council (ERC) under the European Union [648913]
  4. Spanish MICINN Project [MTM2014-57838-C2-2-P]

Ask authors/readers for more resources

In this work, position based quantum cryptography is studied from the perspective of geometric functional analysis and its connections with quantum games. The optimal amount of entanglement for attackers to compromise the security of PBQC protocols is explored, and a position verification protocol is proposed with lower bounds on the resources needed to break it being found.
In this work we initiate the study of position based quantum cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games. The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol. Known upper bounds for that quantity are exponential in the size of the quantum systems manipulated in the honest implementation of the protocol. However, known lower bounds are only linear. In order to deepen the understanding of this question, here we propose a position verification (PV) protocol and find lower bounds on the resources needed to break it. The main idea behind the proof of these bounds is the understanding of cheating strategies as vector valued assignments on the Boolean hypercube. Then, the bounds follow from the understanding of some geometric properties of particular Banach spaces, their type constants. Under some regularity assumptions on the former assignment, these bounds lead to exponential lower bounds on the quantum resources employed, clarifying the question in this restricted case. Known attacks indeed satisfy the assumption we make, although we do not know how universal this feature is. Furthermore, we show that the understanding of the type properties of some more involved Banach spaces would allow to drop out the assumptions and lead to unconditional lower bounds on the resources used to attack our protocol. Unfortunately, we were not able to estimate the relevant type constant. Despite that, we conjecture an upper bound for this quantity and show some evidence supporting it. A positive solution of the conjecture would lead to stronger security guarantees for the proposed PV protocol providing a better understanding of the question asked above.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available