Paper 2011/421
Superposition Attacks on Cryptographic Protocols
Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, and Louis Salvail
Abstract
Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by
requiring that as long as the queries satisfy some constraint, there
is some problem the adversary cannot solve, such as compute a certain
piece of information. Even if the protocol is quantum, the queries are typically classical, such as a choice of subset of players to
corrupt. In this paper, we introduce a fundamentally new model of
quantum attacks on protocols, where the adversary is allowed to ask
several classical queries in quantum superposition. This is a strictly
stronger attack than the standard one, and we consider the security of
several primitives in this model. We show that a secret-sharing scheme
that is secure with threshold
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. Proceedings of ICITS 2013
- Keywords
- quantumprotocolssuperposition attacks
- Contact author(s)
- ivan @ cs au dk
- History
- 2014-07-08: last of 6 revisions
- 2011-08-05: received
- See all versions
- Short URL
- https://ia.cr/2011/421
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/421, author = {Ivan Damgård and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, title = {Superposition Attacks on Cryptographic Protocols}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/421}, year = {2011}, url = {https://eprint.iacr.org/2011/421} }