Literature DB >> 35224512

Authentication of variable length messages in quantum key distribution.

Khodakhast Bibak1, Bruce M Kapron2, Venkatesh Srinivasan2.   

Abstract

Authentication plays a critical role in the security of quantum key distribution (QKD) protocols. We propose using Polynomial Hash and its variants for authentication of variable length messages in QKD protocols. Since universal hashing is used not only for authentication in QKD but also in other steps in QKD like error correction and privacy amplification, and also in several other areas of quantum cryptography, Polynomial Hash and its variants as the most efficient universal hash function families can be used in these important steps and areas, as well. We introduce and analyze several efficient variants of Polynomial Hash and, using deep results from number theory, prove that each variant gives an ε-almost-Δ-universal family of hash functions. We also give a general method for transforming any such family to an ε-almost-strongly universal family of hash functions. The latter families can then, among other applications, be used in the Wegman-Carter MAC construction which has been shown to provide a universally composable authentication method in QKD protocols. As Polynomial Hash has found many applications, our constructions and results are potentially of interest in various areas.
© The Author(s) 2022.

Entities:  

Keywords:  Polynomial Hash; Polynomial congruence; Quantum key distribution; ε-almost-strongly universal

Year:  2022        PMID: 35224512      PMCID: PMC8850259          DOI: 10.1140/epjqt/s40507-022-00127-0

Source DB:  PubMed          Journal:  EPJ Quantum Technol        ISSN: 2196-0763            Impact factor:   4.455


Introduction

Key establishment protocols, in which cryptographic keys are securely exchanged between parties over a public channel, usually use methods from public-key cryptography, like Diffie–Hellman key exchange (DH) and elliptic-curve Diffie–Hellman (ECDH); see [1] for a comprehensive treatment of the key establishment protocols in cryptography. However, the security of such schemes relies on the computational hardness of certain mathematical problems (namely, the discrete logarithm problem, the elliptic-curve discrete logarithm problem, and the integer factorization problem) which can be solved on a sufficiently powerful quantum computer running Shor’s algorithm. Quantum key distribution (QKD), which relies on the foundations of quantum mechanics, provides a higher level of security than such schemes. QKD is provably secure even against an adversary with unbounded computational power and is also becoming increasingly feasible to implement. QKD has found many surprising applications, its commercialization has been successful, and QKD networks are now deployed in some metropolitan areas [2]. There are many excellent surveys on QKD (see, e.g., [3-5]). Studying the security of QKD has become a topic of great importance (see [6, 7] for two excellent surveys). QKD requires a quantum channel and a classical channel. The classical channel needs to be authenticated to avoid man-in-the-middle (MITM) attacks. For the authentication of the communications on the classical channel, the original message authentication codes (MACs) proposed by Wegman and Carter [8], its variants [9], or other efficient constructions [10] are used. All these MACs use universal hash functions in their constructions. In the Wegman–Carter paradigm [8] the message is first hashed with an ε-almost-strongly universal hash function and then encrypted with a one-time pad. The application of the Wegman–Carter paradigm in QKD was originally proposed by Bennett and Brassard [11, 12] in the BB84 protocol (their well-known QKD scheme developed in 1984) and by Bennett et. al. [13], and since then has been studied extensively (see, e.g., [9, 10, 14–18]). The Wegman–Carter MAC construction is described as follows. The legitimate parties share a secret hash function chosen uniformly at random from an ε-almost-strongly universal (ε-ASU) family of hash functions, and a secret encryption key (a sequence of random one-time pads). A message is authenticated by first hashing it with the shared hash function and then encrypting the resulting hash value with the shared encryption key (shared one-time pad). The resulting encrypted hash value, called an authentication tag, is transmitted together with the message (as a pair). Upon receiving this pair, the legitimate party recomputes and validates it. Such a MAC algorithm is information-theoretically (unconditionally) secure, that is, even an adversary who has unbounded computational power cannot forge the MAC with probability greater than the collision probability of the hash function family [8]. Because, in the authentication of the classical channel, the legitimate parties need to share some initial small secret information in advance as described above, QKD is sometimes called a quantum key growing (rather than quantum key distribution) protocol. The Wegman–Carter MAC construction has been shown in [18] to be universally composable (UC) [19-21], and therefore it is sufficient for authentication in QKD systems. One way to make QKD protocols more efficient and applicable is to construct efficient ε-ASU hash function families because these families are the main ingredient in the Wegman–Carter construction (and in many other universal hashing based MACs). In this paper, following [22-24] we propose using Polynomial Hash (PH) and its variants for authentication of variable length messages in QKD systems. Since universal hashing is used not only for authentication in QKD but also in other steps in QKD like error correction and privacy amplification [7, 13, 25–30], and also in several other areas of quantum cryptography (that we will briefly mention in the last section), Polynomial Hash and its variants as the most efficient universal hash function families can be used in these important steps and areas, as well. Polynomial Hash is a well-known ε-almost-Δ-universal (ε-AΔU) family of hash functions which has found various important applications, for example, Galois/Counter Mode (GCM) [31] (which is used in IPsec, SSH, and TLS) and Poly1305 [32] (which is used in Google Chrome’s TLS, and later was added to OpenSSH) use this scheme. See also [33-43] for various other applications of Polynomial Hash. We introduce and analyze several efficient variants of Polynomial Hash and, using deep results from number theory, prove that such variants are also ε-AΔU and so can be used in various applications. Furthermore, we propose a general method by which any ε-AΔU hash function family can be transformed to an ε-ASU family. Therefore, the Polynomial Hash variants constructed in this paper can all be transformed to ε-ASU families which makes them useful for various applications including authentication of variable length messages in QKD. The rest of this paper is organized as follows. In Sect. 2, we review some results on equations over fields and rings, in particular some rather underappreciated results of Konyagin [44, 45], using which we obtain upper bounds for the number of solutions of polynomial congruences over the ring of integers modulo n, . In Sect. 3, we formally define universal hashing and its variants and prove a general result for transforming ε-AΔU families to ε-ASU families. In Sect. 4, we construct and analyze several efficient variants of Polynomial Hash and compare our results with available results.

Equations over fields and rings

Throughout the paper, n is a positive integer, p is a prime, is the ring of integers modulo n defined as , is a field, and is the finite field with q elements, where q is a prime power. Also, is the prime field. Note that . Finding (the number of) solutions of univariate and multivariate polynomial equations over fields and rings is a fundamental problem in mathematics, computer science, and related areas with many applications in various domains. In this paper, by a polynomial we mean a univariate polynomial. As a classical example, one can mention the Fundamental Theorem of Algebra which gives the exact number of solutions of polynomial equations over the field of complex numbers.

Theorem 2.1

(Fundamental Theorem of Algebra) Let be a non-zero polynomial of degree with complex coefficients. Then the equation has, counting multiplicities, exactly d complex solutions. Equivalently, the field of complex numbers is algebraically closed. There are about a hundred proofs(!) of the Fundamental Theorem of Algebra [46]. See [46] for “one of the most elegant and certainly the shortest” proof. By a solution of the polynomial congruence we mean an integer in that satisfies the congruence. So, every polynomial congruence modulo n has at most n solutions. Similarly, every multivariate polynomial congruence in k variables modulo n has at most solutions. A natural question is whether the Fundamental Theorem of Algebra can be applied to the ring (that is, to polynomial congruences modulo n)? The answer is no; there is no direct analog of the Fundamental Theorem of Algebra for polynomial congruences. Let us see some examples. The following result, proved by D. N. Lehmer [47], gives an explicit formula for the number of solutions of linear congruences:

Theorem 2.2

(Lehmer’s Theorem) Let . The linear congruence has a solution if and only if , where . Furthermore, if this condition is satisfied, then there are solutions. Note that the generalization of Lehmer’s Theorem to higher degree multivariate polynomial congruences is a challenging problem. In fact, even the quadratic version addressed by Cohen [48] has much more complicated formulas. By Lehmer’s Theorem, the linear congruence , where a and b are integers, has zero, one, or more solutions (in fact, zero or solutions). As another example, the quadratic congruence has four solutions 1, 3, 5, and 7. These examples show that the Fundamental Theorem of Algebra is not applicable to polynomial congruences. But when the modulus is prime, we have the following result due to Lagrange which gives an upper bound for the number of solutions (see, e.g., [49]).

Theorem 2.3

(Lagrange’s Theorem) Given a prime p, let be a polynomial with integer coefficients such that (said to be of degree d). Then the polynomial congruence has at most d solutions. Lagrange’s Theorem can be extended from the prime field to arbitrary fields (not necessarily finite) as the following (see, e.g., [50]):

Theorem 2.4

Let be a field and be a non-zero polynomial of degree with coefficients in . Then the polynomial equation has, counting multiplicities, at most d solutions in . Therefore, it has at most d distinct solutions in . It would be useful to compare the above results:

Remark 2.5

The following observations are useful, specially when discussing the Polynomial Hash and its variants: Setting in Theorem 2.4 we obtain Lagrange’s Theorem but not in full generality. In fact, in Theorem 2.4 when , the coefficients of the polynomial must be in , but in Lagrange’s Theorem the coefficients are arbitrary integers. While Theorem 2.4 works on arbitrary fields (including the field of complex numbers), it does not imply the Fundamental Theorem of Algebra. In fact, the Fundamental Theorem of Algebra gives the exact number of complex solutions of polynomial equations over the field of complex numbers, but Lagrange’s Theorem and Theorem 2.4 just give upper bounds for the number of solutions over the prime field and arbitrary fields, respectively. The proof of the Fundamental Theorem of Algebra is totally different from the proof of Lagrange’s Theorem and Theorem 2.4. In fact, the proof of the Fundamental Theorem of Algebra is usually given as a result in complex analysis and “the shortest” proof [46] still requires two pages, but the proofs of Lagrange’s Theorem and Theorem 2.4 are usually given as results in number theory and field theory and can be written in just a few lines (see, e.g., [49, 50]). Note that Lagrange’s Theorem does not hold for composite moduli. For example, the quadratic congruence has four solutions 1, 3, 5, and 7. Surprisingly, Vandiver [51] obtained, for ‘restricted’ solutions, exactly the same upper bound as in Lagrange’s Theorem and Theorem 2.4 in the much more general setting of commutative rings with identity (that we call Vandiver’s Theorem), but, unfortunately, his result, while is quite interesting, seems to have been forgotten. Let be a commutative ring with identity. Two elements are said to be absolutely distinct if is not zero and not a zero divisor.

Theorem 2.6

(Vandiver’s Theorem) Let be a commutative ring with identity. Let be a polynomial with coefficients in such that . Then the polynomial equation has at most d absolutely distinct solutions. Taking , Vandiver [51] derived the following version for . Two integers a and b are said to be absolutely incongruent modulo n if is coprime to n.

Theorem 2.7

(Vandiver’s Theorem for ) Given a positive integer n, let be a polynomial with integer coefficients such that . Then the polynomial congruence has at most d absolutely incongruent solutions. Note that setting , a prime, in Vandiver’s Theorem for , we re-obtain Lagrange’s Theorem since any two distinct elements of are absolutely incongruent modulo p. The rest of this section is devoted to generalizing Lagrange’s Theorem to composite moduli (or, equivalently, generalizing Vandiver’s Theorem for to cover all solutions). For generalization to prime power moduli, an upper bound for the number of solutions can be obtained using the following result (see, e.g., [49]).

Theorem 2.8

Suppose is an integer and s is a solution of the polynomial congruence Then we have the following cases: If then s can be lifted in a unique way from to . That is, there is a unique which generates s and which satisfies the polynomial congruence If then: If , s can be lifted from to in p distinct ways. If , s cannot be lifted from to . Given a positive integer n, let be a polynomial with integer coefficients such that (said to be of degree d). Denote by the number of solutions of the polynomial congruence

Lemma 2.9

If then

Proof

The proof easily follows from the basic properties of congruences. □ Therefore, by Lemma 2.9, it suffices to consider the number of solutions of the above polynomial congruence with . For simplicity, we denote the number of such solutions by . Using Lagrange’s Theorem and Theorem 2.8, we can obtain the following upper bound for .

Theorem 2.10

Let be an integer. Then Clearly, if then , for all integers . So, let . Then, using Theorem 2.8, corresponding to each solution of the polynomial congruence modulo p there will be 0, 1, or p solutions modulo . So, using Lagrange’s Theorem and Theorem 2.8, . Similarly, corresponding to each solution of the polynomial congruence modulo there will be 0, 1, or p solutions modulo . Therefore, . Repeating this process, the result follows. □ Is there a better upper bound for ? Yes(!), and the best upper bound for is widely attributed to Stewart [52], and to Schmidt and Stewart [53]. But we have discovered that Konyagin [44, 45] (in Russian and back in 1979) has already obtained a stronger and more general upper bound for (that we call Konyagin’s Theorem). We remark that all these bounds were obtained using advanced tools in number theory and their proofs are rather long and complicated.

Theorem 2.11

(Konyagin’s Theorem) Let be an integer. Then Furthermore, if and , then So far, we have very good upper bounds for the number of solutions of polynomial congruences modulo prime powers. Now, we generalize these upper bounds to arbitrary moduli. For this we need the following tool (see, e.g., [49]).

Theorem 2.12

Let be a polynomial with integer coefficients. Also, let be positive integers, pairwise coprime, and let . Then the polynomial congruence has a solution if and only if each of the polynomial congruences has a solution. Moreover, if and denote the number of solutions of (1) and (2), respectively, then When modulus n is square-free, we obtain the best upper bound for using Lagrange’s Theorem and Theorem 2.12 as follows.

Theorem 2.13

Let n be square-free with r distinct prime factors. Then Let n has the prime factorization , where ’s are distinct primes. By Lagrange’s Theorem, for all i. Since ’s are pairwise coprime, using Theorem 2.12 we have  □ Similarly, when modulus n is an arbitrary positive integer, we obtain the best upper bound for using Konyagin’s Theorem and Theorem 2.12 as follows.

Theorem 2.14

Let has the prime factorization , where ’s are prime and for all i. Then Furthermore, if and for all i, then By Konyagin’s Theorem, we have for all i. Since ’s are pairwise coprime, using Theorem 2.12 we have Similarly, if and for all i, then by Konyagin’s Theorem and Theorem 2.12, we have  □

Universal hashing and its variants

Universal hash function families, introduced by Carter and Wegman [54], guarantee a low number of collisions in expectation when a hash function is chosen uniformly at random from the universal hash function family. These hash function families have many important applications in computer science and cryptography (see [55] for a comprehensive list of references). We begin by describing universal hashing and its variants in detail [54, 56–60]. For a set , we write to denote that x is chosen uniformly at random from .

Definition 3.1

Let H be a family of functions from a finite domain D to a finite range R, and let ε be a constant such that . The family H is a universal family of hash function if the probability, over a random choice of a hash function from H, that two distinct elements of D collide (i.e., have the same hash value) is at most (that is, distinct elements of D do not collide too often). Formally, H is universal if for any two distinct , we have . Also, H is an ε-almost universal (ε-AU) family of hash functions if for any two distinct , we have . Note that an ε-AU family, for a sufficiently small ε, is close to being universal. Suppose R is a finite additive Abelian group. The family H is a Δ-universal family of hash functions if, given a randomly chosen hash function from H, the difference of the hash values of any two distinct elements of D is uniformly distributed in R. Formally, H is Δ-universal if for any two distinct , and all , we have , where ‘−’ denotes the group subtraction operation. Also, H is an ε-almost-Δ-universal (ε-AΔU) family of hash functions if for any two distinct , and all , we have . When for some k, the operation ‘−’ can be replaced by ‘⊕’ (XOR), and H is also called ε-almost XOR universal (ε-AXU) or ε-otp-secure. The family H is a strongly universal (or 2-wise-independent) family of hash functions if, given a randomly chosen hash function from H, the hash values of any two distinct elements of D are independent and uniformly distributed in R. Formally, H is strongly universal if for any two distinct , and all , we have . Also, H is an ε-almost-strongly universal (ε-ASU) family of hash functions if for any two distinct , and all , we have (that is, given a randomly chosen h from H, is uniformly distributed in R), and (that is, given a randomly chosen h from H, is hard to guess even if is known). Equivalently, H is ε-ASU if for any two distinct , and all , we have , and . Because many universal hash functions only work on fixed length messages, it is often necessary to extend the domain of the hash function to work on longer messages. Wegman and Carter [8] introduced a construction which recursively hashes messages to a desired length. Let H be an ε-AU family of hash functions, which maps blocks of length 2l to blocks of length l. At each round of tree hash, the message is split into blocks of length 2l and each block is hashed with some . The length of the message is halved each round, so the runtime is logarithmic in the size of message, and after n rounds of tree hash, the collision probability is [61]. However, due to the recursive nature of tree hash, it is not suitable for devices with limited memory. Instead, an iterative method can be constructed by composing hash functions.

Theorem 3.2

([59]) For , let be almost-universal families of hash functions where , and define . Then H has the following property: If is -AU and is -AU, then H is -AU. If is -AU and is -AΔU, then H is -AΔU. If is -AU and is -ASU, then H is -ASU. The last two parts of this result can be used to pair an efficient ε-AU hash family with an ε-AΔU or ε-ASU hash family to create an efficient ε-AΔU or ε-ASU family. We can also use this result to create a Merkle–Damgård like paradigm for universal hash functions. Let be ε-AU and let . Then the family can hash messages of length l for any positive l, and is -AU. This construction was used by Minematsu and Tsunoo [62], and a more general proof on its collision bound was given by Duval and Leurent [63]. Often the collision probability of a hash function may be larger than desired. For this reason, there are several techniques for reducing the collision probability of a hash function family. If H is an ε-AU family of hash functions, then by hashing a message with two independent keys and concatenating the results, the probability of collision is lowered to , at the expense of doubling the computational work, the length of the hash value, and the size of the key. The well-known Toeplitz extension, which has been used in several MAC algorithms (c.f. [56, 64]), reduces the key size needed for this technique. Rather than generating independent keys , , we generate the values and use the keys and . We can easily extend this procedure to concatenate n hash values to get a collision probability of . While the computation and hash length still increase by a factor of n, the size of the key only increases by n values. Not only does this save key material, it reduces memory accesses, thus potentially improving performance. Now, we prove a general result for transforming ε-AΔU families to ε-ASU families. Because for authentication in QKD systems we need efficient ε-ASU families, our result implies that constructing such families boils down to constructing efficient ε-AΔU families. Our result is a generalization of the following result by Etzel et al. [65] which seems to have remained underappreciated.

Theorem 3.3

Let the family be a Δ-universal family of hash functions, where K is the key space and R is a finite additive Abelian group. Then the family where and ‘+’ denotes the group addition operation, is strongly universal. In order to generalize the above result, we also need the following result (see [66]):

Theorem 3.4

Let G be an Abelian group, and let be independent random variables which take on values in G. If one of is uniformly distributed in G, then the sum is also uniformly distributed in G. More generally, Sherstnev [66] gave necessary and sufficient conditions on the distributions of independent random variables , taking on values in an Abelian group G, under which the sum is uniformly distributed in G. Now, we are ready to prove our result.

Theorem 3.5

Let the family be an ε-almost-Δ-universal family of hash functions, where K is the key space and R is a finite additive Abelian group. Then the family where and ‘+’ denotes the group addition operation, is ε-almost-strongly universal. For any two distinct , and all , we have Since H is ε-almost-Δ-universal, we have Also, by Theorem 3.4 we have Consequently, Hence, the result follows. □

Polynomial Hash and its variants

An ε-AΔU family of hash functions which has received much attention is Polynomial Hash (PH), which is used for hashing variable length messages. The idea is that we put the message blocks as the coefficients of a polynomial and then evaluate the polynomial at the secret key, where all operations are done in a specific field or ring. In this section, we introduce and analyze several efficient variants of Polynomial Hash and then compare our results with available results. As Polynomial Hash has found many applications, our constructions and results might be of interest in various areas.

Five variants

Here we introduce five variants of Polynomial Hash (other variants are also possible depending on applications) and analyze their universality using results from Sect. 2. Polynomial Hash Over Ring of Integers Modulo n (PH-IM): In this family, message blocks are all in , where is the smallest prime divisor of n, the key x is in , and all operations are performed in . Formally,

Definition 4.1

(PH-IM) Given an integer with the smallest prime divisor , we define where for every message and every key .

Theorem 4.2

Let has the prime factorization , where ’s are prime and for all i. Then we have the following cases: The family PH-IM is -almost-Δ-universal. If n is square-free, then the family PH-IM is -almost-Δ-universal. If and for all i, then the family PH-IM is -almost-Δ-universal.

Proof

We only prove the last part; the proofs for other parts are similar. Let and be any two distinct messages. Put . For every we have Since , there exists some such that . Now, we need to find the maximum number of solutions of the above polynomial congruence over all choices of and . Note that since ’s are in and at least one of them is not zero, we have . Now, by Theorem 2.14, if and for all i, then the polynomial congruence has at most solutions. Consequently, for part (iii) we have  □ Polynomial Hash With Probability At Least Zero Collision (PH-ZC): Let p be an odd prime and k be a positive even integer not divisible by p. Denote the set of even elements of by E and the set of odd elements of by O. In this family, message blocks are all in E or are all in O, the key x is in , and all operations are performed in . We define the family over E; the definition and the result over O are similar. Formally,

Definition 4.3

(PH-ZC) Given an odd prime p and a positive even integer k not divisible by p, we define where for every message and every key .

Theorem 4.4

The family PH-ZC is -almost-Δ-universal. Furthermore, with probability at least the collision probability is exactly zero. Let and be any two distinct messages. Put . For every we have Since , there exists some such that . Now, we need to find the maximum number of solutions of the above polynomial congruence over all choices of and . Since ’s are all even, ’s are also all even. For every , if b is odd then the polynomial congruence has no solution, but if b is even then it has at most k solutions. On the other hand, by Lagrange’s Theorem, for every the polynomial congruence has at most d solutions. Now, using Theorem 2.12 the polynomial congruence has no solution if b is odd, and has at most kd solutions if b is even. Consequently, we have Note that although is an upper bound for the collision probability, but when b is odd and possibly in other cases (so with probability at least ) the collision probability is exactly zero. Hence, the result follows. □ Polynomial Hash Over Prime Fields (PH-PF): In this family, each message block and the key x are in , and all operations are performed in . Formally,

Definition 4.5

(PH-PF) Given a prime p, where for every message and every key .

Theorem 4.6

The family PH-PF is -almost-Δ-universal. Same as above, just use Lagrange’s Theorem or Theorem 2.4. □

Remark 4.7

It is important to note that we do not have to restrict the message blocks to be in or . In fact, the message blocks can be arbitrary non-negative integers as long as no two messages have all their corresponding blocks congruent modulo p or modulo n. See Theorem 4.9 for an example of such constructions in the case of but the same technique is also applicable to . Polynomial Hash Over Prime Fields With Arbitrary Message Blocks (PH-PA): Let A be a subset of such that no two elements of A have all their corresponding coordinates congruent modulo p. In this family, each message m is in A, the key x is in , and all operations are performed in . Formally,

Definition 4.8

(PH-PA) Given a prime p, where for every message and every key .

Theorem 4.9

The family PH-PA is -almost-Δ-universal. Same as above, just use Lagrange’s Theorem. Note that when we find the difference of the two polynomials, at least one of the coefficients is non-zero modulo p (by the definition of the set A) so the assumption of Lagrange’s Theorem is satisfied. Also, note that Theorem 2.4 is not applicable here because message blocks are not necessarily in . □ Polynomial Hash Over Finite Fields (PH-FF): In this family, each message block and the key x are in , and all operations are performed in . Formally,

Definition 4.10

(PH-FF) Given the finite field with q elements, where q is a prime power, where for every message and every key .

Theorem 4.11

The family PH-FF is -almost-Δ-universal. Same as above, just use Theorem 2.4. □

Corollary 4.12

Using Theorem 3.5, any ε-AΔU family, in particular the families studied in this paper, can be transformed to ε-ASU families which makes them useful for various applications including authentication of variable length messages in QKD. This can be done by adding a uniform value to the hash functions, where R is the range of the corresponding hash functions.

Comparison and remarks

The above techniques and results on the Polynomial Hash and its variants and comparing them with what were known before, reveals some remarks: Polynomial Hash is widely attributed to Wegman and Carter [8], Dietzfelbinger et. al. [67], den Boer [68], Bierbrauer et. al. [69], and Taylor [70]. But we have discovered that it has been already introduced by Mehlhorn and Vishkin [71] back in 1984 (of course, Wegman and Carter [8] already studied the degree one case). So far, only the families PH-PF and PH-FF have been introduced in the literature but, unfortunately, there is a growing number of papers that explicitly or implicitly have used the Fundamental Theorem of Algebra to prove the ε-almost-Δ-universality of these families. As discussed in detail in Remark 2.5, the Fundamental Theorem of Algebra works only over the field of complex numbers not over the prime field or finite fields, so is not applicable to the families PH-PF and PH-FF. Instead, those papers should have used Lagrange’s Theorem or Theorem 2.4 as we did. Polynomial Hash has been already used to provide a very efficient universal hash function family, for authentication in QKD [22-24] but it has not been explained why that is the case. In fact, the efficiency of Polynomial Hash comes from at least the following observations: The evaluation of a polynomial of degree d, needs only d multiplications and d additions since, by Horner’s rule, can be written as Therefore, hashing a message of length using Polynomial Hash needs only d multiplications and d additions, while hashing the same message using most other universal hash function families needs more computations, for example, hashing it using MMH∗ [56, 72, 73] (which is one of the most well-known universal hash function families) needs multiplications and additions. Unlike most other universal hash function families (e.g., MMH∗ and its variants) which hash fixed length messages (that is, once the key is chosen we can only hash message of the same length as the key) Polynomial Hash can be used for hashing variable length messages because each message block becomes the coefficient of the polynomial, and so is independent of the key. Even though the collision bounds of the hash families introduced in this paper are quite strong, even if for some application we pick a family with a slightly weaker collision bound thanks to the everlasting security of QKD [5, 6, 74] if authentication remains unbroken during the execution of the QKD protocol, then the resulting key is information-theoretically secure; breaking authentication after the protocol has output the key will not change the security of the generated key. As universal hashing is used not only for authentication in QKD but also in other steps in QKD like error correction and privacy amplification [7, 13, 25–30], our constructions and results might lead to improvements in QKD protocols, among other areas. Universal hash functions have been recently used in studying quantum secure direct communication (QSDC) [75] (see also, [76-80]), quantum secret sharing (QSS) (either directly [81, 82] or via a security proof based on QKD [83]), quantum conference key agreement (QCKA) [84-86], and quantum authentication [87-89]. Therefore, our efficient and secure constructions and results might lead to improvements in these directions as well. Our study of Polynomial Hash over and its variants also demonstrate various benefits which do not hold in the case of the two well-known variants of Polynomial Hash. In particular, We do not have to restrict the message blocks to be in or . In fact, the message blocks can be arbitrary non-negative integers (unlike the two well-known versions). See Remark 4.7 and Theorem 4.9 for the details. In some of these variants with probability at least the collision probability is exactly zero (see Theorem 4.4). We do not need large prime numbers or finite field arithmetic anymore (that is, all arithmetic is done in ). It is also possible to introduce, generalize, and analyze other variants of Polynomial Hash (for specific applications) using results from Sect. 2. Although in QKD the legitimate parties need to share some initial small secret information in advance for the authentication of the classical channel, each round of QKD provides substantially larger fresh key materials, part of which can be used for authentication in the next round of QKD. Furthermore, keys generated in each round of QKD are completely independent of all prior keys and messages [5, 6, 74]. Therefore, even if any of our schemes uses more key materials at the expense of other benefits, the protocol compensates it in the next round. We connected Polynomial Hash and QKD with deep results in number theory. This may motivate more work in these areas.
  6 in total

1.  On the Foundation of a Constructive Theory of Discrete Commutative Algebra (Second Paper).

Authors:  H S Vandiver
Journal:  Proc Natl Acad Sci U S A       Date:  1935-03       Impact factor: 11.205

2.  Quantum Secure Direct Communication with Quantum Memory.

Authors:  Wei Zhang; Dong-Sheng Ding; Yu-Bo Sheng; Lan Zhou; Bao-Sen Shi; Guang-Can Guo
Journal:  Phys Rev Lett       Date:  2017-05-31       Impact factor: 9.161

3.  Experimental quantum conference key agreement.

Authors:  Massimiliano Proietti; Joseph Ho; Federico Grasselli; Peter Barrow; Mehul Malik; Alessandro Fedrizzi
Journal:  Sci Adv       Date:  2021-06-04       Impact factor: 14.136

4.  Implementation and security analysis of practical quantum secure direct communication.

Authors:  Ruoyang Qi; Zhen Sun; Zaisheng Lin; Penghao Niu; Wentao Hao; Liyuan Song; Qin Huang; Jiancun Gao; Liuguo Yin; Gui-Lu Long
Journal:  Light Sci Appl       Date:  2019-02-06       Impact factor: 17.782

5.  Device-independent quantum key distribution with random key basis.

Authors:  René Schwonnek; Koon Tong Goh; Ignatius W Primaatmaja; Ernest Y-Z Tan; Ramona Wolf; Valerio Scarani; Charles C-W Lim
Journal:  Nat Commun       Date:  2021-05-17       Impact factor: 14.919

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.