11email: [email protected] 22institutetext: Portland State University, Portland, Oregon, US
22email: [email protected] 33institutetext: Paul G. Allen School of Computer Science & Engineering
University of Washington, Seattle, Washington, US
33email: [email protected]
Quantum Key-length Extension
Abstract
Should quantum computers become available, they will reduce the effective key length of basic secret-key primitives, such as blockciphers. To address this we will either need to use blockciphers with inherently longer keys or develop key-length extension techniques to amplify the security of a blockcipher to use longer keys.
We consider the latter approach and revisit the FX and double encryption constructions. Classically, FX was proven to be a secure key-length extension technique, while double encryption fails to be more secure than single encryption due to a meet-in-the-middle attack. In this work we provide positive results, with concrete and tight bounds, for the security of both of these constructions against quantum attackers in ideal models.
For FX, we consider a partially-quantum model, where the attacker has quantum access to the ideal primitive, but only classical access to FX. This is a natural model and also the strongest possible, since effective quantum attacks against FX exist in the fully-quantum model when quantum access is granted to both oracles. We provide two results for FX in this model. The first establishes the security of FX against non-adaptive attackers. The second establishes security against general adaptive attackers for a variant of FX using a random oracle in place of an ideal cipher. This result relies on the techniques of Zhandry (CRYPTO ’19) for lazily sampling a quantum random oracle. An extension to perfectly lazily sampling a quantum random permutation, which would help resolve the adaptive security of standard FX, is an important but challenging open question. We introduce techniques for partially-quantum proofs without relying on analyzing the classical and quantum oracles separately, which is common in existing work. This may be of broader interest.
For double encryption, we show that it amplifies strong pseudorandom permutation security in the fully-quantum model, strengthening a known result in the weaker sense of key-recovery security. This is done by adapting a technique of Tessaro and Thiruvengadam (TCC ’18) to reduce the security to the difficulty of solving the list disjointness problem and then showing its hardness via a chain of reductions to the known quantum difficulty of the element distinctness problem.
1 Introduction
The looming threat of quantum computers has inspired significant efforts to design and analyze post-quantum cryptographic schemes. In the public-key setting, polynomial-time quantum algorithms for factoring and computing discrete logarithms essentially break all practically deployed primitives [28].
In the secret-key setting, Grover’s quantum search algorithm [12] will reduce the effective key length of secret-key primitives by half. Thus, a primitive like the AES-128 blockcipher which may be thought to have 128 bits of security against classical computers may provide no more than 64 bits of security against a quantum computer, which would be considered significantly lacking. Even more worrisome, it was shown relatively recent that quantum computers can break several secret-key constructions completely such as the Even-Mansour blockcipher [23] and CBC-MAC [17] if we grant the attacker fully quantum access to the cryptosystem.
This would not be the first time that we find ourselves using too short of a key. A similar issue had to be addressed when the DES blockcipher was widely used and its 56 bit keylength was considered insufficient. Following approaches considered at that time, we can either transition to using basic primitives which have longer keys (e.g. replacing AES-128 with AES-256) or design key-length extension techniques to address the loss of concrete security due to quantum computers. In this paper we analyze the latter approach. We consider two key-length extension techniques, FX [20] and double encryption, and provide provable bounds against quantum attackers in ideal models.
Of broader and independent interest, our study of FX focuses on a hybrid quantum model which only allows for classical online access to the encrypted data, whereas offline computation is quantum. This model is sometimes referred to as the “Q1 model” in the cryptanalysis literature [17, 5], in contrast to the fully-quantum, so-called “Q2 model”, which allows for quantum online access. This is necessary in view of existing attacks in the Q2 model showing that FX is no more secure than the underlying cipher [24], but also, Q1 is arguably more realistic and less controversial than Q2. We observe that (as opposed to the plain model) ideal-model proofs in the Q1 model can be harder than those in the Q2 model, as we need to explicitly account for measuring the online queries to obtain improved bounds. In many prior ideal-model Q1 proofs, e.g. [21, 22, 14, 4, 18], this interaction is handled essentially for free because the effects of online and offline queries on an attacker’s advantage can largely be analyzed separately. Our work introduces techniques to handle the interaction between classical online queries and quantum offline ideal-model queries in Q1 proofs that cannot be analyzed separately. On the other hand, our result on double encryption considers the full Q2 model – and interestingly, restricting adversaries to the Q1 model does not improve the bound. To be self-explanatory we will often refer to the Q1 and Q2 models as the partially-quantum and fully-quantum models, respectively.
The remainder of this introduction provides a detailed overview of our results for these two constructions, and of the underlying challenges and techniques.
1.1 The FX Construction
The FX construction was originally introduced by Kilian and Rogaway [20] as a generalization of Rivest’s DESX construction. Consider a blockcipher which uses a key to encrypt messages . Then the FX construction introduces “whitening” key which is xor-ed into the input and output of the blockcipher. Formally, this construction is defined by . (Note that the Even-Mansour blockcipher [11] may be considered to be a special case of this construction where , i.e., the blockcipher is a single permutation.) This construction has negligible efficiency overhead as compared to using directly.
Kilian and Rogaway proved this scheme secure against classical attacks in the ideal cipher model. In particular, they established that
Here measures the advantage of in breaking the strong pseudorandom permutation (SPRP) security of while making at most queries to the ideal cipher and at most queries to the construction. Compared to the bound achieved by alone, this is a clear improvement so can be considered a successful key-length extension technique again classical attackers.
Is this construction equally effective in the face of quantum attackers? The answer is unfortunately negative. Leander and May [24], inspired by a quantum attack due to Kuwakado and Morii [23] that completely breaks Even-Mansour blockcipher, gave a quantum attack against FX, which shows that the whitening keys provide essentially no additional security over that achieved by in isolation. Bonnetain, et al. [5] further reduced the number of online quantum queries in the attack. Roughly speaking, quantum queries to FX construction and local quantum computations of the blockcipher suffice to recover the secret encryption key. Note that, however, such attacks require full quantum access to both the ideal primitive and to the instance FX that is under attack, i.e. they are attacks in the fully-quantum model. The latter is rather strong and may be considered unrealistic. While we cannot prevent a quantum attacker from locally evaluating a blockcipher in quantum superposition, honest implementations of encryption will likely continue to be classical.111Some may argue that maintaining purely classical states, e.g., enforcing perfect measurements is also non-trivial physically. However, we deem maintaining coherent quantum superposition significantly more challenging.
Partially-quantum model.
Because of the realistic concern of the fully-quantum model and the attacks therein that void key extension in FX, we turn to the partially-quantum model in which the attacker makes quantum queries to ideal primitives, but only classical queries to the cryptographic constructions.
In this model there has been extensive quantum cryptanalysis on FX and related constructions [13, 5]. The best existing attack [5] recovers the key of FX using roughly classical queries to the construction and quantum queries to the ideal cipher. However, to date, despite the active development in provable quantum security, we are not aware of SPRP or just PRF security analysis, which gives stronger security guarantees. Namely, it should not just be infeasible to retrieve a key, but also to merely distinguish the system from a truly random permutation (or function). We note that in the special case where the primitives are plain-model instantiations (e.g., non-random-oracle hash functions), with a bit of care many security reductions carry over to the quantum setting [25]. This is because the underlying primitives are hidden from the adversary, and hence the difficulty arising from the interaction of classical and quantum queries to two correlated oracles becomes irrelevant.
Our main contribution on FX is to prove, for the first time, indistinguishability security in the partially-quantum model, in two restricted ways. Although they do not establish the complete security, our security bounds are tight in their respective settings.222Throughout, when mentioning tightness, we mean it with respect to the resources required to achieve advantage around one. The roots in our bounds make them weaker for lower resource regimes. Removing these is an interesting future direction.
Non-adaptive security.
We first consider non-adaptive security where we restrict the adversary such that its classical queries to the FX construction (but not to the underlying ideal cipher) must be specified before execution has begun. We emphasize that non-adaptive security of a blockcipher suffices to prove adaptive security for many practical uses of blockciphers such as the various randomized or stateful encryption schemes (e.g. those based on counter mode or output feedback mode) in which an attacker would have no control over the inputs to the blockcipher.
In this setting the bound we prove is of the form
Supposing (as with AES-128), an attacker able to make queries to the ideal cipher could break security of in isolation. But to attack FX, such an attacker with access to encryptions would need to make queries to the ideal cipher. In fact we can see from our bound that breaking the security with constant probability would require the order of queries in total, matching the bound given in the attacks mentioned above [5]. Hence our bound is tight.
To prove this bound we apply a one-way to hiding (O2H) theorem of Ambainis, Hamburg, and Unruh [3], an improved version of the original one in [32]. This result provides a clean methodology for bounding the probability that an attacker can distinguish between two functions drawn from closely related distributions given quantum access. The non-adaptive setting allows us to apply this result by sampling the outputs of FX ahead of time and then considering the ideal world in which the ideal cipher is chosen independently of these outputs and the real world in which we very carefully reprogram this ideal cipher to be consistent with the outputs chosen for FX. These two ideal ciphers differ only in the places where we need to reprogram.
Adaptive security of FFX.
As a second approach towards understanding fully adaptive security of FX, we consider a variant construction (which we call FFX for “function FX”) that replaces the random permutation with a random function. In particular, suppose is a function family which uses a key on input messages to produce outputs . Then we define .333Note we have removed the external xor with . In FX this xor is necessary, but in our analysis it would not provide any benefit for FFX. For this construction we prove a bound of the form
in the partially-quantum random oracle model. Note that this matches the bound we obtained for the non-adaptive security of FX. Since the same key-recovery attack [5] also applies here, it follows that our bound is tight as well. Our proof combines two techniques of analyzing a quantum random oracle, the O2H theorem above and a simulation technique by Zhandry [35]. The two techniques usually serve distinct purposes. O2H is helpful to program a random oracle, whereas Zhandry’s technique is typically convenient for (compactly) maintaining a random oracle and providing some notion of “recording” the queries. In essence, in the two function distributions of O2H for which we aim to argue indistinguishability, we apply Zhandry’s technique to simulate the functions in a compact representation. As a result, analyzing the guessing game in O2H, which implies indistinguishability, becomes intuitive and much simplified. This way of combining them could also be useful elsewhere.
To build intuition for the approach of our proof, let us first consider one way to prove the security of this construction classically. The core idea is to use lazy sampling. In the ideal world, we can independently lazily sample a random function to respond to queries and a random function to respond to queries. These lazily random functions are stored in tables.
The real world can similarly be modeled by lazily sampling and to respond to the separate oracles. However, these oracles need to be kept consistent. So if the adversary ever queries to and to , then the game should copy values between the two tables such that the same value is returned by both oracles. (Here and are the keys honestly sampled by the game.) Alternatively, we can think of the return value being stored only in the table when such queries occur (rather than being copied into both tables) as long as we remember that this has happened. When represented in this manner, the two games only differ if the adversary makes such a pair of queries, where we think of the latter one as being “bad”. Thus a simple bound on the probability of making such a query bounds the advantage of the adversary.
In our quantum security proof we wish to proceed analogously. First, we find a way to represent the responses to oracle queries with two (superpositions over) tables that are independent in the ideal world and dependent in the real world (the dependency occurs only for particular “bad” inputs). Then (using the O2H theorem of Ambainis, Hamburg, and Unruh) we can bound the distinguishing advantage by the probability of an attacker finding a “bad” input. In applying this theorem we will jointly think of the security game and its adversary as a combined adversary making queries to an oracle which takes in both the input of and the tables being stored by the game – processing them appropriately.
The required representation of the oracles via two tables is a highly non-trivial step in the quantum setting. For starters, the no-cloning theorem prevents us from simply recording queries made by the adversary. This has been a recurring source of difficulty for numerous prior papers such as [33, 30, 9]. We make use of the recent elegant techniques of Zhandry [35] which established that, by changing the perspective (e.g., to the Fourier domain), a random function can be represented by a table which is initialized to all zeros and then xor-ed into with each oracle query made by the adversary. This makes it straightforward to represent the ideal world as two separate tables. To represent the real world similarly, we exploit the fact that the queries to FFX are classical. To check if an input to FFX is “bad” we simply check if the corresponding entry of the random oracle’s table is non-zero. To check if an input to the random oracle is “bad” we check if it overlaps with prior queries to FFX which we were able to record because they were classical. For a “bad” input we then share the storage of the two tables and this is the only case where the behavior of the real world differs from that of the ideal world. These “bad” inputs may of course be part of a superposition query and it is only for the bad components of the superposition that the games differ.
Difficulty of extending to FX.
It is possible that this proof could be extended to work for normal FX given an analogous way to lazily represent a random permutation. Unfortunately, no such representation is known.
Czajkowski, et al. [8] extended Zhandry’s lazy sampling technique to a more general class of random functions, but this does not include permutations because of the correlation between the different outputs of a random permutation. Chevalier, et al. [6] provided a framework for recording queries to quantum oracles, which enables succinctly recording queries made to an externally provided function for purposes of later responding to inverse queries. This is distinct from the lazy sampling of a permutation that we require. Rosmanis [27] introduced a new technique for analyzing random permutations in a compressed manner and applied it to the question of inverting a permutation (given only forward access to it). Additional ideas seem needed to support actions based on the oracle queries that have been performed so far. This is essential in order to extend our proof for the function variant of FX to maintain consistency for the real world in the face of “bad” queries.
Recent work of Czajkowski [7] provided an imperfect lazy sampling technique for permutations and used it to prove indifferentiability of SHA3. They claim that their lazy sampling strategy cannot be distinguished from a random permutation with advantage better than . Unfortunately, this bound is too weak to be useful to our FX proof. For example, if we already have security without key-length extension. Determining if it is possible to perfectly lazily sample a random permutation remains an interesting future direction.
1.2 Double Encryption
The other key-extension technique we consider is double encryption. Given a blockcipher this is defined by . This construction requires more computational overhead than FX because it requires two separate application of the blockcipher with different keys. Classically, this construction is not considered to be a successful key-length extension technique because the meet-in-the-middle attack [10, 26] shows that it can be broken in essentially the same amount of time as alone.
However, this does not rule out that double encryption is an effective key-length extension method in the quantum setting, as it is not clear that the Grover search algorithm [12] used to halve the effective keylength of blockciphers can be composed with the meet-in-the middle attack to unify their savings. The security of double encryption in the quantum setting was previously considered by Kaplan [16]. They related the key-recovery problem in double encryption to the claw-finding problem, and gave the tight quantum query bound for solving key recovery (here is the length of the lists in the claw-finding problem). This indicates that in the quantum setting double encryption is in fact useful (compare to ), although key-recovery security is fairly weak.
We strengthen their security result by proving the SPRP security, further confirming double encryption as an effective key-extension scheme against quantum attacks. This is proven in the fully-quantum model, and the bound we obtain matches the attack in [16] which works in the partially-quantum model. Namely restricting to the weaker partially-quantum model would not improve the bound. Our result is obtained by a reduction to list disjointness. This is a worst-case decision problem measuring how well an algorithm can distinguish between a pair of lists with zero or exactly one element in common, which can be viewed as a decision version of the claw-finding problem. This reduction technique was originally used by Tessaro and Thiruvengadam [31] to establish a classical time-memory trade-off for double encryption. We observe that their technique works for a quantum adversary.
We then construct a chain of reductions to show that the known quantum hardness of element distinctness [1, 34] (deciding if a list of elements are all distinct) can be used to establish the quantum hardness of solving list disjointness. Our result (ignoring log factors) implies that a highly successful attacker must make oracle queries which is more than the queries needed to attack used in isolation.
Our proof starts by observing that Zhandry’s [34] proof of the hardness of the search version of element distinctness (finding a collision in a list) in fact implies that a promise version of element distinctness (promising that there is exactly one collision) is also hard. Then a simple reduction (randomly splitting the element distinctness list into two lists) shows the hardness of the search version of list disjointness. Next we provide a binary-search inspired algorithm showing that the decision version of list disjointness can be used to solve the search version, implying that the decision version must be hard. During our binary search we pad the lists we are considering with random elements to ensure that our lists maintain a fixed size which is necessary for our proof to go through.
The final bound we obtain for double encryption is of the form
The sixth root arises in this bound from the final step in our chain of results analyzing list disjointness. The binary search algorithm requires its underlying decision list disjointness algorithm to have relatively high advantage. To obtain this from a given algorithm with advantage we need to amplify its advantage by running in on the order of times. The number of queries depending on the square of causes the root to arise in the proof.
1.3 Overview
In Section 2, we introduce preliminaries such as notation, basic cryptographic definitions, and some background on quantum computation that we will use throughout the paper. Following this, in Section 3 we consider the security of FX in the partially quantum setting. Non-adaptive SPRP security of FX is proven in Section 3.1 and adaptive PRF security of FFX is proven in Section 3.2. We conclude with Section 4 in which we prove the SPRP security of double encryption against fully quantum adaptive attacks.
2 Preliminaries
For , we let and . The set of length bit strings is denoted . We use to denote string concatenation. We let denote the set of injections .
We let denote the (randomized) execution of algorithm with input and oracle access to which produces output . For different we will specify whether it can access its oracles in quantum superposition or only classically. If is a set, then denotes randomly sampling from .
We express security notions via pseudocode games. See Fig. 1 for some example games. In the definition of games, oracles will sometimes be specified by pseudocode with the following form.
|
This notation indicates that are variables controlled by the adversary prior to the oracle query and are variables controlled by the game itself which the adversary cannot access. At the end of the execution of the oracle, these variables are overwritten with the values indicated in the return statement. Looking ahead, we will be focusing on quantum computation so this notation will be useful to make it explicit that O can be interpreted as a unitary acting on the registers and (because O will be an efficiently computable and invertible permutation over these values). If is a function stored by the game, then oracle access to represents access to the oracle that on input returns .
We define games as outputting boolean values and let denote the probability that game G returns true. When not otherwise indicated, variables are implicitly initialized to store all 0’s.
If is an adversary expecting access to multiple oracles we say that it is order consistent if the order it will alternate between queries to these different oracles is a priori fixed before execution. Note that order consistency is immediate if, e.g., is represented by a circuit where each oracle is modeled by a separate oracle gate, but is not immediate for other possible representations of an adversary.
Ideal Models.
In this work we will work in ideal models – specifically, the random oracle model or the ideal cipher model. Fix (throughout this paper we will treat these parameters as having been fixed already). We let be the set of all functions and be the set of all functions such that is a permutation on . When convenient, we will write in place of for . Similarly, we will write for and for the inverse of when . When we omit the subscript to or .
In the random oracle model, honest algorithms and the adversary are given oracle access to a randomly chosen . In the ideal cipher model, they are given oracle access to and for chosen at random from . We refer to queries to these oracles as primitive queries and queries to all other oracles as construction queries.
Game Return Return
Game
Return
Return
Return
Function family and pseudorandomness.
A function family is an efficiently computable element of . If, furthermore, and is efficiently computable then we say is a blockcipher and let .
If is a function family (constructed using oracle access to a function ), then its security (in the random oracle model) as a pseudorandom function (PRF) is measured by the game shown in Fig. 1. In it, the adversary attempts to distinguish between a real world () where it is given oracle access to with a random key and an ideal world () where it is given access to a random function. We define the advantage function .
If is a blockcipher (constructed using oracle access to a function and its inverse), then its security (in the ideal cipher model) as a strong pseudorandom permutation (SPRP) is measured by the game shown in Fig. 1. In it, the adversary attempts to distinguish between a real world () where it is given oracle access to , with a random key and an ideal world () where it is given access to a random permutation. We define the advantage function .
In some examples, we will restrict attention to non-adaptive SPRP security. In such cases our attention is restricted to attackers whose queries to Ev and Inv when relevant are a priori fixed before execution. That is, is a non-adaptive attacker which makes at most classical, non-adaptive queries to if there exists such that only ever queries Ev on for and Inv on for . Then we write in place of .
2.1 Quantum Background
We assume the reader has basic familiarity with quantum computation. Quantum computation proceeds by performing unitary operations on registers which each contain a fixed number of qubits. We sometimes use to denote composition of unitaries. Additionally, qubits may be measured in the computational basis. We will typically use the principle of deferred measurements to without loss of generality think of such measurements as being deferred until the end of computation.
The Hadamard transform acts on a bitstring (for some ) via . Here denotes inner product modulo 2 and the summation is over . The Hadamard transform is its own inverse. We sometimes use the notation to denote the Hadamard transform applied to registers .
We make use of the fact that if is a permutation for which both and can be efficiently implemented classically, then there is a comparable efficient quantumly computable unitary which maps according to for . For simplicity, we often write in place of . If is a function, we define the permutation .
Game
Return
Game
Run until its -th query
Measure the input to this query
If the query is to then
Return
Else (the query is to )
Return
One-way to hiding.
We will make use of (a slight variant of) a one-way to hiding (O2H) theorem of Ambainis, Hamburg, and Unruh [3]. The theorem will consider an adversary given oracle access either to permutations or permutations . It relates the advantage of the adversary in distinguishing between these two cases to the probability that the adversary can be used to find one of those points on which differs from or differs from . The result considers a distribution over where are sets, are permutations on the same domain, are permutations on the same domain, and is some auxiliary information. Such a is valid if for all and for all . Now consider the game shown in Fig. 2. In it, an adversary is given and tries to determine which of the oracle pairs it has access to. We define .
The game in the same figure measures the ability of to query its oracles on inputs at which and (or and ) differ. It assumes that the adversary makes at most oracle queries. The adversary is halted in its execution on making a random one of these queries and the input to this query is measured. If the input falls in the appropriate set or , then the game returns true. Thus we can roughly think of this as a game in which is trying to guess a point on which the two oracles differ. We define , which leads to a bound on .
Theorem 2.1 ([3], Thm.3)
Let be a valid distribution and be an adversary making at most oracle queries. Then .
Our statement of the theorem differs from the result as given in [3] in that we consider arbitrary permutations, rather than permutations of the form for some function , and we provide the attacker with access to two oracles rather than one.444Their result additionally allows the adversary to make oracle queries in parallel and bounds its advantage in terms of the “depth” of its oracle queries rather than the total number of queries. We omit this for simplicity. These are simply notational conveniences to match how we will be applying the theorem. The proof given in [3] suffices to establish this variant without requiring any meaningful modifications.
The most natural applications of this theorem would apply it to distributions for which the guessing advantage is small for any efficient adversary . This will indeed be the case for our use of it in our Theorem 3.1. However, note that it can also be applied more broadly with a distribution where it is not necessarily difficult to guess inputs on which the oracles differ. We will do so at the end of our proof of Theorem 3.2. Here we will use a deterministic so, in particular, the sets and are a priori fixed and not hard to query. The trick we will use to profitably apply the O2H result is to exploit knowledge of the particular form that will take (it will be a reduction adversary internally simulating the view of another adversary) to provide a useful bound on its guessing advantage .
3 The FX Construction
The FX construction (originally introduced by Kilian and Rogaway [20] as a generalization of Rivest’s DESX construction) is a keylength extension for blockciphers. In this construction, an additional key is used which is xor-ed with input and the output of the blockcipher.555Technically, the original definition of FX [20] uses distinct keys for xor-ing with the input and the output, but this would not provide any benefit in our concrete security analysis so we focus on the simplified construction. Formally, given a blockcipher , the blockcipher is defined by . Here and so and . Its inverse can similarly be computed as . Let and .
Kilian and Rogaway [19] analyzed the PRP security of FX against classical attacks, showing that where is the number of queries and is the number of queries made by (with modeled as an ideal cipher). In [24], Leander and May showed a quantum attack against the FX construction – establishing that the added whitening keys did not provide additionally security. This attack uses a clever combination of the quantum algorithms of Grover [12] and Simon [29]. It was inspired by an attack by Kuwakado and Morii [23] showing that the Even-Mansour blockcipher [11] provides no quantum security. Thus, it seems that does not provide meaningfully more security than against quantum attackers.
However, the attack of Leander and May requires quantum access to both the FX construction and the underlying blockcipher . This raises the question of whether the FX is actually an effective key-length extension technique in the partially-quantum setting where the adversary performs only classical queries to the construction oracles. In this section, we approach this question from two directions. First, in Section 3.1 we apply Theorem 2.1 with a careful representation of the real and ideal worlds to show that FX does indeed achieve improved security against non-adaptive attacks.
Analyzing the full adaptive security of FX against classical construction queries seems beyond the capabilities of current proof techniques. Accordingly, in Section 3.2, we consider a variant of FX in which a random oracle is used in place of the ideal cipher and prove its quantum PRF security. Here we apply a new reduction technique (built on the “sparse” quantum representation of a random function introduced by Zhandry [35] and Theorem 2.1, the O2H theorem from Ambainis, Hamburg, and Unruh [3]) to prove that this serves as an effective key-length extension technique in our setting. It seems likely that our technique could be extended to the normal FX construction, should an appropriate sparse quantum representation of random permutations be discovered.
3.1 Security of FX Against Non-Adaptive Attacks
The following theorem bounds the security of the FX construction against non-adaptive attacks (in which the non-adaptive queries are all classical). This result is proven via a careful use of Theorem 2.1 in which the distribution is defined in terms of the non-adaptive queries that the adversary will make and defined so as to perfectly match the two worlds that is attempting to distinguish between.
Theorem 3.1
Let be a quantum adversary which makes at most classical, non-adaptive queries to and consider with the underlying blockcipher modeled by an ideal cipher drawn from . Then
where is the number of quantum oracle queries that makes to the ideal cipher.
Proof
We will use Theorem 2.1 to prove this result, so first we define a distribution . Suppose that are the distinct queries will make to Ev and are the distinct queries that will make to Inv. The order in which these queries will be made does not matter. Then we define as shown in Fig. 3. This distribution is valid (as required for Theorem 2.1) because is reprogrammed to differ from by making inputs in map to different values in .
Distribution
// Step 1: Sample responses to construction queries
For do
;
For do
If then
Else
;
// Step 2: Sample as independent ideal cipher
// Step 3: Reprogram for consistency with construction queries
;
;
;
;
For do
For do
For do
Return
We will show that the oracles output by this distribution (described in words momentarily) can be used to perfectly simulate the views expected by . In particular, let be an adversary (for ) which runs , responding to queries with , responding to queries with , and simulating with its own oracles . When halts with output , this adversary halts with the same output. We claim that (i) and (ii) . This gives .
Claim (ii) follows by noting that the view of is identical when run by or by in . In , its construction queries are answered with the random permutation . When it is run by in , these queries are answered with the tables and which can be viewed as having just lazily sampled enough of a random permutation to respond to the given queries. In both cases, its primitive oracle is an independently chosen ideal cipher.
Claim (i), follows by noting that the view of is identical when run by or by in . In , construction queries are answered by the construction using the ideal cipher and keys , . In the distribution, we first sample the responses to the construction queries and then construct the ideal cipher by picking and and setting to equal except for places where we reprogram it to be consistent with these construction queries. The construction will map to for each , which means that the condition should hold. These inputs and outputs are stored in the sets and . The sets and store the inputs mapping to and outputs mapped to by , respectively. Thus while making the above condition hold, we additionally reprogram so that elements of map to (random, non-repeating) elements of .
In particular, the uniformity of ensures that the map induced by between and is a random bijection. The last for loop samples a random bijection between and . Because there are no biases in which values fall into these two cases among those of and , this means the map between these two sets is a uniform bijection as desired. A more detailed probability analysis of Claim (i) is given in Appendix 0.A.
Applying the bound on from Theorem 2.1 gives us
so we complete the proof by bounding this probability. Let denote the event that the -th query of in is to and let denote the measured value of this query so that
A union bound over the different elements of gives
However, note that the view of in is independent of and so we get that
Applying analogous analysis to the case gives
and hence . Plugging this into our earlier inequality gives the stated bound.∎
3.2 Adaptive Security of FFX
In this section we will prove the security of FFX (a variant of FX using a random oracle in place of the ideal cipher) against quantum adversaries making strictly classical queries to the construction.
Formally, given a function family , we model the FFX construction by the function family by .666The outer xor by used in is omitted because it is unnecessary for our analysis. Here and so , , and . Let , , and .
Theorem 3.2
Let be an order consistent quantum adversary which makes classical queries to Ev and consider with the underlying function family modeled by a random oracle drawn from . Then
where is the number of quantum oracle queries that makes to the random oracle and is the number of queries it makes to Ev.
We can reasonably assume that so the dominant behavior of the above expression is .
The proof of this result proceeds via a sequence of hybrids which gradually transition from the real world of to the ideal world. Crucial to this sequence of hybrids are the technique of Zhandry [35] which, by viewing a space under dual bases, allows one to simulate a random function using a sparse representation table and to “record” the queries to the function. For the ideal world, we can represent the random oracle and the random function underlying Ev independently using such sparse representation tables. With some careful modification, we are also able to represent the real world’s random oracle using a similar pair of sparse representation tables as if it were two separate functions. However, in this case, the tables will be slightly non-independent in that if the adversary queries Ev on an input and the random oracle on then the results of the latter query is stored in the Ev table, rather than the random oracle table. Beyond this minor consistency check (which we are only able to implement because the queries to Ev are classical and so can be stored by simulation), the corresponding games are identical. Having done this rewriting, we can carefully apply Theorem 2.1 to bound the ability of an adversary to distinguish between the two worlds by its ability to trigger this consistency check.
As mentioned in Section 2.1, our application of Theorem 2.1 here is somewhat atypical. Our distribution over functions will be deterministic, but we are able to still extract a meaningful bound from this by taking advantage of our knowledge of the particular behavior of the adversary we apply Theorem 2.1 with.
Proof
In this proof we will consider a sequence of hybrid games through . Of these games we will establish the following claims.
-
1.
-
2.
-
3.
Combining these claims gives the desired result.
In formally defining our hybrids we write the computation to be performed using the following quantum registers.
-
•
: The workspace of . The adversary’s final output is written into .
-
•
: The -qubit register (representing the function key/index) uses when making oracle queries to the random oracle.
-
•
: The -qubit register (representing function inputs) used when making oracle queries to the random oracle or Ev.
-
•
: The -qubit register (representing function outputs) into which the results of oracle queries are written.
-
•
: The -qubit register which stores the function defining the random oracle (initially via its truth table).
-
•
: The -qubit register which stores the function defining Ev.
-
•
: The -qubit register which stores the first key of the construction.
-
•
: The -qubit register which stores the second key of the construction.
-
•
: The -qubit register which tracks how many Ev queries has made.
-
•
: The -qubit registers used to store the classical queries that makes to Ev.
We start by changing our perspective. A quantum algorithm that makes classical queries to Ev can be modeled by thinking of a quantum algorithm that measures its register immediately before the query. (Because the behavior of Ev is completely classical at this point, we do not need to measure the register as well.) Measuring the register is indistinguishable from using a CNOT operation to copy it into a separate register (i.e. xor-ing into the previously empty register that will never again be modified). By incorporating this CNOT operation into the behavior of our hybrid game, we treat as an attacker that makes fully quantum queries to its oracles in the hybrid game. We think of as deferring all of measurements until the end of its computation. Because all that matters is its final output we can have the game measure just that register and assume that does not internally make any measurements. The principle of deferred measurement ensures that the various changes discussed here do not change the behavior of . This perspective change lets us use purely quantum analysis, rather than mixing quantum and classical.
Claim 1.
We start by considering the hybrids through , defined in Fig. 4 which are all identical to the ideal world of . In these transitions we are applying the ideas of Zhandry [35] to transition to representing the random functions stored in and by an all zeros table which is updated whenever the adversary makes a query.
The hybrid is mostly just rewritten to use the registers indicated above. So holds.
Games ,
Run
Measure , ,
Return
Return
Return
Games ,
Run
Run
Measure , ,
Return
Return
Return
Next consider which differs from only in the grey highlighted code which initializes and in the uniform superposition and then measures them at the end of execution. (Recall that the Hadamard transform applied to the all zeros state gives the uniform superposition.) Note that these register control, but are unaffected by the oracles Ev and Ro. Because they are never modified while is executing, the principle of deferred measurement tells us that this modification is undetectable by , giving
Next consider which contains the boxed, but not the highlighted, code. This game uses the oracles FEv and FRo, the Fourier versions of Ev and Ro, which xor the value of ’s query into the the register or . Note that ’s access to these oracles is mitigated by on each query. The superscript here indicate that the Hadamard transform is being applied to the registers and . We have that and both hold.777 This follows as a consequence of the following. Let and be the unitaries which for are defined by and . Then . So because the adversary’s oracles are identical.
Next consider which contains the highlighted, but not the boxed, code. For this transition, recall that is the identity operator. So to transition to this game we can cancel the operator used to initialize with the operator applied before ’s first FRo oracle query. Similarly, we can cancel the operation performed after any (non-final) FRo query with the operation performed before the next FRo query. Finally, the operation that would be performed after the final FRo query is instead delayed to be performed immediately before is measured. (We could have omitted this operation and measurement entirely because all that matters at that point is the measurement of .) The operators on are similarly changed. Because does not have access to the and registers, we can indeed commute the operators with in this manner without changing behavior. Hence , as desired. Note that and independently store tables which are initialized to all zeros and then written into by the adversary’s queries.
Games ,
Run
Measure , , ,
Return
Return
Return
Games ,
Run
Run
Measure , , ,
Return
Return
Return
Claim 2.
We now consider the hybrids through (starting from ), which are defined in Fig. 5 and Fig. 6 using similar ideas as in the transition from through . As we will justify, these games are all equivalent to the real world of .
First rewrote the real world of to use our specified registers and to record queries into in Ev. Then in , rather than sampling , , and uniformly at the beginning of the game we put them in the uniform superposition and measure them at the end of the game. For we replace our oracles that xor into the adversary’s register with oracles that xor into the register using Hadamard operations, some of which we then cancel out to transition to . The same arguments from Claim 1 of why these sorts of modifications do not change the behavior of the game apply here and so .
Games ,
Run
Run
Measure , , ,
Return
If and then
// Input is bad
Else
Return
Return
Return
If and ( or ) then
// Input is bad
Return
Our next transitions are designed to make the current game’s oracles identical with those of , except on some “bad” inputs. In we have a single all zeros table which gets written into by queries that makes to either of its oracles, while in the oracles separately wrote into either or . For we will similarly separate the single table into separate tables and . However, we cannot keep them completely independent, because if the adversary queries FEv with and FRo with then both of these operations would be writing into the same table location in . Consider the following unitary which acts on registers and and is controlled by the registers , , , and . We will think of this unitary as transitioning us between a representation of as a single table (with an all-zero table) and a representation of it divided between and .
|
In words, swaps and for each that has been previous queried to FEv (as stored by and ). Note that is its own inverse. In we (i) initialize the table as all zeros, (ii) perform before and after each oracle query, and (iii) perform after has executed. We verify that has the same value in that it would have had in during each oracle query and at the end before measurement. The application of before the first oracle query does nothing (because ) so is all zeros for this query as required. As we’ve seen previously with , we can commute with the operations of because only acts on registers outside of the adversary’s control. We can similarly commute with . Hence the operation after every non-final oracle query can be seen to cancel with the operation before the following oracle query. The operation after the final oracle query cancels with the operation performed after halts execution. Hence, as claimed.
For the transition to let us dig into how our two-table representation in works so that we can incorporate the behavior of directly into the oracles. For simplicity of notation in discussion, let denote . First note that in between oracle queries the two tables representation of will satisfy the property that for each we will have and for all other we will have that .888More precisely, the corresponding registers hold superpositions over tables satisfying the properties we discuss. This is the case because after each query we have applied to an which contains the same values it would have in and an which is all zeros.
Now consider when a query is executed with some and . If , then and are swapped, is xored into , then finally and are swapped back. Equivalently, we could have xored directly into and skipped the swapping around. If , then is xored into before and are swapped. If beforehand, then we could equivalently have xored directly into and skipped the swapping around (because must have held from our assumption on ). If beforehand, then we could equivalently could have swapped and first, then xored into . The equivalent behavior we described is exactly the behavior captured by the oracle which is used in in place of . It checks if () and (), performing a swap if so. Then is xored into . A swap is also performed if and , however this case is impossible from our earlier observation that when is not in . This second case was added only to ensure that is a permutation.
Similarly, consider when a query is executed with some , , . Any swapping done by uses , so when this just xors into . If is not in , then is unaffected by the swapping so again this just xors into . When and , first would have been swapped with , then would be xored into , then and would be swapped back. Equivalently, we could just have xored into and skipped the swapping. This behavior we described is exactly the behavior captured by the oracle which is used in in place of .
We have just described that on the inputs we care about behaves identically to and behaves identically to . Hence , completing this claim.
Games ,
Run
Measure
Return
If and then
// Input is bad
Else
Return
If and ( or )
// Input is bad
Return
Claim 3.
To compare hybrids and we will note their oracles only differ on a small number of inputs (in particular those labelled as bad by comments in our code) and then apply Theorem 2.1 to bound the difference between them. To aid in this we have rewritten them as and in Fig. 7. For both we have removed some operations performed after halted its execution for cleanliness because these operations on registers other than cannot affect the probability that it is measured to equal . So we have and .
Let and be the permutations defining the corresponding oracle in . Define and analogously. These permutations differ only on the inputs we referred to as bad. So let denote the set of bad for FEv (i.e. those for which and either or hold). Let denote the set of bad for FRo (i.e. those for which and ). Let denote the distribution which always outputs . Clearly this is a valid distribution for Theorem 2.1 by our choice of and .
Now we can define an adversary for which simulates the view of in by locally running the code of that hybrid except for during oracle queries when it uses its oracle to simulate FEv and oracle to simulate FRo. Because the simulation of these views are perfect we have that
where the inequality follows from Theorem 2.1, noting that makes oracle queries.
To complete the proof we bound . In the following probability calculation we use and to denote random variables taking on the values the corresponding variables have at the end of an execution of . Let denote a random variable which equals if the measured query is to and equals otherwise. Then conditioning over each possible value of gives
Because is order consistent we can pick disjoint sets and with such that means the -th query is to ’s FEv oracle and means that the -th query is to its FRo oracle. Note that and . The view of (when run by ) in matches its view in so, in particular, it is independent of and . Hence we can think of these keys being chosen at random at the end of execution when analyzing the probability of .
For a FRo query, the check for bad inputs is if and . The variable is counting the number of FEv queries made so far, so . By a union bound,
when .
For a FEv query, the check for bad inputs is if and is non-zero.999Note that the other bad inputs, for which and is non-zero, will never occur. In , each query to FRo can make a single entry of non-zero so it will never have more than non-zero entries. By a union bound,
when .
The proof is then completed by noting
and plugging in to our earlier expression.∎
4 Double Encryption
In this section we prove the security of the double encryption key-length extension technique against fully quantum attacks. Our proof first reduces this to the ability of a quantum algorithm to solve the list disjointness problem and then extends known query lower bounds for element distinctness to list disjointness (with some modifications).
The double encryption blockcipher is constructed via two sequential application of an underlying blockcipher. Formally, given a blockcipher , we define the double encryption blockcipher by . Here so and . Its inverse can be computed as .
Classically, the meet-in-the-middle attack [10, 26] shows that this construction achieves essentially the same security a single encryption. In the quantum setting, this construction was recently considered by Kaplan [16]. They gave an attack and matching security bound for the key-recovery security of double encryption. This leaves the question of whether their security result can be extended to cover full SPRP security, which we resolve by the main theorem of this section. This theorem is proven via a reduction technique of Tessaro and Thiruvengadam [31] which they used to establish a (classical) time-memory tradeoff for the security of double encryption, by reducing its security to the list disjointness problem and conjecturing a time-memory tradeoff for that problem.
Problems and languages.
In addition to the list disjointness problem (1LD), we will also consider two versions of the element distinctness problem (ED, 1ED). In general, a problem PB specifies a relation on set on instances (i.e. is function which maps an instance and witness to a decision ). This relation induces a language . Rather than think of instances as bit strings, we will think of them as functions (to which decision and search algorithms are given oracle access). To restrict attention to functions of specific sizes we let where denotes the restriction of to functions , where . To discuss instances not in the language we let and .
Problems have decision and search versions. The goal of a decision algorithm is to output 1 (representing “acceptance”) on instances in the language and 0 (representing “rejection”) otherwise. Relevant quantities are the minimum probability of accepting an instance in the language, the maximum probability of accepting an instance not in the language, and the error rater which are formally defined by
We define the decision PB advantage of by . In non-cryptographic contexts, instead of looking at the difference in probability that inputs that are in or out of the language are accepted, one often looks at how far these are each from . This motivates the definition .
The goal of a search algorithm is to output a witness for the instance. We define its advantage to be the minimum probability it succeeds, i.e., .
Problem | Witness | Promise |
---|---|---|
ED | - | |
1ED | At most one witness. | |
1LD | At most one witness. Injective . |
Example problems.
The list disjointness problem asks how well an algorithm can distinguish between the case that is give (oracle access to) two lists which are disjoint or have one element in common. In particular, we interpret an instance as the two functions defined by . Let denote the set of for which and are injective and which have elements in common, i.e. for which . Then 1LD is defined by the relation which on input returns 1 iff and the instance set (i.e., the promise that there is at most one element in common and that the lists are individually injective). The search version of list disjointness is sometimes referred to as claw-finding.
The element distinctness problem asks how well an algorithm can detect whether all the elements in a list are distinct. Let denote the set of which have collision pairs, i.e. for which . Then ED is defined by the relation which on input returns 1 iff and with the instance set consisting of all functions. We let 1ED denote restricting ED to (i.e., the promise that there is at most one repetition in the list).
4.1 Security result
The following theorem shows that an attacker achieving constant advantage must make oracle queries (ignoring log terms). Our bound is not tight for a lower parameter regimes, though future work may establish better bounds for list disjointness in these regimes.
Theorem 4.1
Consider with the underlying blockcipher modeled by an ideal cipher drawn from . Let be a quantum adversary which makes at most queries to the ideal cipher. Then
As mentioned earlier, our proof works by first reducing the security of double encryption against quantum queries to the security of the list disjointness problem against quantum queries. This is captured in the following theorem which we prove now.
Theorem 4.2
Consider with the underlying blockcipher modeled by an ideal cipher drawn from . Let be a quantum adversary which makes at most queries to the ideal cipher. Then for any we can construct making at most oracle queries such that
We state and prove a bound on in Section 4.2. Our proof applies the same reduction technique as Tessaro and Thiruvengadam [31], we are verifying that it works quantumly as well.
Proof
For , let be defined to be identical to except that is chosen uniformly from rather than from . This has no effect when because the keys are not used, so . When there was only a chance that would have equalled so .
Now we define a decision algorithm for 1LD which uses its input lists to simulate a view for . When the lists are disjoint ’s view will perfectly match that of and when the lists have exactly one element in common ’s view will perfectly match that of . Hence we have and , so which gives the claimed bound.
Adversary
Return
If then
Else
Return
If then
Else
Return
The adversary is defined in Fig. 9. It samples a permutation on , a permutation on , and a cipher . The permutation is used to provide a random map from the keys to the elements of the lists and . We will interpret as a tuple with and . Then gets mapped to . Therefore either none of the keys map to the same element or a single pair of them maps to the same element.
Adversary ’s queries to Ev and Inv are answered using and . Its queries to the ideal cipher are more complicated and are handled by the oracles Ic and Inv. We can verify that these oracles define permutations on bitstring inputs, so is a well defined quantum adversary. Consider a key and interpret as a tuple as described above. If , then ideal cipher queries for it are answered as if . If , then ideal cipher queries for it are answered as if .101010When using output of as keys for we are identifying the elements of with elements of in the standard manner. If the list element is not mapped to by any other keys, then the indexing into ensures that is independent of and for all other . If and map to the same list element (and for ), then and are random permutations conditioned on and independent of all other .
In , the permutation of Ev and Inv is independent of each which are themselves independent of each other. So this perfectly matches the view presented to by when the lists are disjoint. In , each is pairwise independent and the permutation of Ev and Inv is defined to equal . This perfectly matches the view presented to by when the lists have one element in common because we can think of it as just having changed the order in which the permutations , , and were sampled.∎
4.2 The Hardness of List Disjointness
If is an algorithm making at most classical oracle queries, then it is not hard to prove that . If, instead, makes as most quantum oracle queries, the correct bound is less straightforward. In this section, we will prove the following result.
Theorem 4.3
If is a quantum algorithm making at most queries to its oracle and is a power of 2, then
We restrict attention to the case that is a power of 2 only for notational simplicity in the proof. Essentially the same bound for more general follows from the same techniques.
Ambanis’s query algorithm for element distinctness [2] can be used to solve list disjointness and hence shows this is tight (up to logarithmic factors) for attackers achieving constant advantage. The sixth root degrades the quality of the bound for lower parameter regimes. An interesting question we leave open is whether this could be proven without the sixth root or the logarithmic factors.
Proof sketch.
The starting point for our reduction is that lower bounds are known both the search and decision versions of ED [1, 34].111111In the proof we actually work with the advantage upper bounds, rather than the corresponding query lower bounds. By slightly modifying Zhandry’s [34] technique for proving this, we instead get a bound on the hardness of . Next, a simple reduction (split the list in half at random) shows that is as hard as .
Then a “binary search” style reduction shows that is as hard as . In the reduction, the algorithm repeatedly splits its lists in half and uses the algorithm to determine which pair of lists contains the non-disjoint entries. However, we need our reduction to work by running the algorithm on a particular fixed size of list (the particular size we showed is hard for) rather than running it on numerous shrinking sizes. We achieve this by padding the lists with random elements. The choice of was made so that with good probability these random elements do not overlap with the actual list. This padding adds the term to our bound.
Finally a generic technique allows us to relate the hardness of 1LD and . Given an algorithm with high 1LD advantage we can run it multiple times to get a precise estimate of how frequently it is outputting and use that to determine what we want to output. This last step is the primary cause of the sixth root in our bound; it required running the 1LD algorithm on the order of times to get a precise enough estimate, where is the advantage of the 1LD algorithm. This squaring of in the query complexity of our algorithm (together with the fact that the query complexity is cubed in our bound) ultimately causes the sixth root.
Constituent lemmas.
In the rest of the section we will state and prove lemmas corresponding to each of the step of the proof described above. In Section 4.3 we apply them one at a time to obtain the specific bound claimed by Theorem 4.3.
Lemma 1 ( is hard)
If is a quantum algorithm for making at most queries to its oracle and , then .
Proof
In [34], Zhandry shows that no -query algorithm can distinguish between a random function and a random injective function with domain and codomain with advantage better than , as long as . We could build a distinguisher that on input runs . If is a collision (i.e., and ), then outputs 1. It checks this by making two additional queries, so . Otherwise it outputs zero. Clearly, cannot be a collision when is an injection so it will always output zero. Hence, if denotes the event that contains exactly one collision we obtain a bound of
(1) |
It remains to lower bound . Note there are possible pairs of inputs that could be collisions. Each pair has a chance of colliding. By a union bound, the probability any other input has the same output as the collision is at most , so there is at least a probability this does not occur. Given the above there are inputs sampled from possible values, so by a union bound the probability none of them collide is at least . This gives
Now setting and applying simple bounds (e.g. and ) gives,
Plugging this lower bound into equation 1, re-arranging, applying the bound , and rounding up to the nearest whole number gives the claimed bound .∎
Lemma 2 ( hard hard)
Let be even. If is a quantum algorithm for making at most queries to its oracle, then there is an algorithm (described in the proof) such that . Algorithm makes at most queries to its oracle.
Proof
On input a list , the algorithm will pick a random permutation . It runs and then, on receiving output , returns . The permutation serves the role of splitting into two sublists for at random. As long as the original collision of doesn’t end up being put into the same sublist (which has probability less than ), will be run on a valid instance and will succeed whenever does. The claim follows.∎
Algorithm
;
; ;
Repeat
For do
// for else
If then
;
Until
Pick
Return
Lemma 3 ( hard hard)
Let be a power of two. If is a quantum algorithm for 1LD making at most queries to its oracle, then there is an algorithm (described in the proof) such that
Algorithm makes at most queries to its oracle.
This theorem’s bound is vacuous if is too small. When applying the result we will have obtained by amplifying the advantage of another adversary to ensure it is sufficiently large.
Proof
The algorithm is given in Fig. 10. The intuition behind this algorithm is as follows. It wants to use the decision algorithm to perform a binary search to find the overlap between and . It runs for rounds. In the -th round, it splits the current left list into two sublists , and the current right lists into two sublists , .121212In code, for with domain defines to be the restriction of to domain and to be the restriction of to domain . If and have an element in common, then one of the pairs of sublists and for must have an element in common. The decision algorithm is run on different pairs to determine which contains the overlap. We recurse with chosen pair, until we are left with lists that have singleton domains at which point we presume the entries therein give the overlap.
Because we need to run the decision algorithm on fixed size inputs we pad the sublists to be of a fixed size using lists and (the two halves of an injection that we sampled locally). As long as the image of does not overlap with the images of and , this padding does not introduce any additional elements repetitions between or within the list input to . By a union bound, overlaps occurs with probability at most .
Conditioned on such overlaps not occurring, will output the correct result if always answers correctly. To bound the probability of erring we can note that it is run times and, each time, has at most a chance of error and apply a union bound.
Put together we have
That makes at most oracle queries is clear.∎
Lemma 4 ( hard PB hard)
Let PB be any problem. Suppose is a quantum algorithm for PB making at most queries to its oracle, with . Then for any there is an algorithm (described in the proof) such that . Algorithm makes queries to its oracle.
Proof
For compactness, let denote the minimum probability that outputs on instances in the language, denote the maximum probability that outputs on instances not in the language, and . We define to be the algorithm that, on input , runs independent copies of (with ) and calculates the average of all the values output by . (Think of this as an estimate of the probability outputs 1 on this input.) If , outputs 0, otherwise it outputs 1.
Let denote the output of the -th execution of . An inequality of Hoeffding [hoeffding] bounds how far the average of independent random variables can differ from the expectation by
for any . Let denote the expected value of (which is also the expected value of ). If is in the language, then . Otherwise . In either case, will output the correct answer if does not differ from by more than (because this is strictly less than ). Applying the above inequality tells us that . (The value of was chosen to make this last inequality hold.)
Hence , , and . The bound on ’s number of queries is clear.∎
4.3 Proof of Theorem 4.3
Let be our given list disjointness adversary which makes oracle queries and has advantage . If we apply Lemma 4 with , then we get an adversary which makes oracle queries. (We used here the assumption to simplify constants.) This adversary has advantage
Next applying Lemma 3, gives us which makes fewer than oracle queries and has advantage
Lemmas 1 and 2 together bound this advantage from the other direction. In particular, we get that
Using the assumption we can bound by . Plugging this in and solving for gives our claimed bound of
Acknowledgements
Joseph Jaeger and Stefano Tessaro were partially supported by NSF grants CNS-1930117 (CAREER), CNS-1926324, CNS-2026774, a Sloan Research Fellowship, and a JP Morgan Faculty Award. Joseph Jaeger’s work done while at the University of Washington. Fang Song thanks Robin Kothari for helpful discussion on the element distinctness problem. Fang Song was supported by NSF grants CCF-2041841, CCF-2042414, and CCF-2054758 (CAREER).
References
- [1] S. Aaronson and Y. Shi. Quantum lower bounds for the collision and the element distinctness problems. Journal of the ACM (JACM), 51(4):595–605, 2004.
- [2] A. Ambainis. Quantum walk algorithm for element distinctness. SIAM Journal on Computing, 37(1):210–239, 2007.
- [3] A. Ambainis, M. Hamburg, and D. Unruh. Quantum security proofs using semi-classical oracles. In A. Boldyreva and D. Micciancio, editors, CRYPTO 2019, Part II, volume 11693 of LNCS, pages 269–295. Springer, Heidelberg, Aug. 2019.
- [4] N. Bindel, M. Hamburg, K. Hövelmanns, A. Hülsing, and E. Persichetti. Tighter proofs of cca security in the quantum random oracle model. In Theory of Cryptography Conference, pages 61–90. Springer, 2019.
- [5] X. Bonnetain, A. Hosoyamada, M. Naya-Plasencia, Y. Sasaki, and A. Schrottenloher. Quantum attacks without superposition queries: the offline Simon’s algorithm. In Advances in Cryptology – ASIACRYPT, pages 552–583. Springer, 2019.
- [6] C. Chevalier, E. Ebrahimi, and Q.-H. Vu. On security notions for encryption in a quantum world. Cryptology ePrint Archive, Report 2020/237, 2020. https://ia.cr/2020/237.
- [7] J. Czajkowski. Quantum indifferentiability of sha-3. Cryptology ePrint Archive, 2021. http://eprint.iacr.org/2021/192.
- [8] J. Czajkowski, C. Majenz, C. Schaffner, and S. Zur. Quantum lazy sampling and game-playing proofs for quantum indifferentiability. Cryptology ePrint Archive, Report 2019/428, 2019. https://eprint.iacr.org/2019/428.
- [9] Ö. Dagdelen, M. Fischlin, and T. Gagliardoni. The Fiat-Shamir transformation in a quantum world. In K. Sako and P. Sarkar, editors, ASIACRYPT 2013, Part II, volume 8270 of LNCS, pages 62–81. Springer, Heidelberg, Dec. 2013.
- [10] W. Diffie and M. E. Hellman. Exhaustive cryptanalysis of the nbs data encryption standard. IEEE Computer, 10(6), 1977.
- [11] S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. Journal of Cryptology, 10(3):151–162, June 1997.
- [12] L. K. Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, STOC ’96, pages 212–219, New York, NY, USA, 1996. Association for Computing Machinery.
- [13] A. Hosoyamada and Y. Sasaki. Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. In Cryptographers’ Track at the RSA Conference, pages 198–218. Springer, 2018.
- [14] K. Hövelmanns, E. Kiltz, S. Schäge, and D. Unruh. Generic authenticated key exchange in the quantum random oracle model. In IACR International Conference on Public-Key Cryptography, pages 389–422. Springer, 2020.
- [15] J. Jaeger, F. Song, and S. Tessaro. Quantum key-length extension. Cryptology ePrint Archive, 2021. http://eprint.iacr.org/2021/579.
- [16] M. Kaplan. Quantum attacks against iterated block ciphers. arXiv preprint arXiv:1410.1434, 2014.
- [17] M. Kaplan, G. Leurent, A. Leverrier, and M. Naya-Plasencia. Quantum differential and linear cryptanalysis. IACR Trans. Symm. Cryptol., 2016(1):71–94, 2016. https://tosc.iacr.org/index.php/ToSC/article/view/536.
- [18] S. Katsumata, S. Yamada, and T. Yamakawa. Tighter security proofs for GPV-IBE in the quantum random oracle model. Journal of Cryptology, 34(1):1–46, 2021.
- [19] J. Kilian and P. Rogaway. How to protect DES against exhaustive key search. In N. Koblitz, editor, CRYPTO’96, volume 1109 of LNCS, pages 252–267. Springer, Heidelberg, Aug. 1996.
- [20] J. Kilian and P. Rogaway. How to protect DES against exhaustive key search (an analysis of DESX). Journal of Cryptology, 14(1):17–35, Jan. 2001.
- [21] E. Kiltz, V. Lyubashevsky, and C. Schaffner. A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. In J. B. Nielsen and V. Rijmen, editors, EUROCRYPT 2018, Part III, volume 10822 of LNCS, pages 552–586. Springer, Heidelberg, Apr. / May 2018.
- [22] V. Kuchta, A. Sakzad, D. Stehlé, R. Steinfeld, and S.-F. Sun. Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and cca security. In Advances in Cryptology – EUROCRYTPT 2020, pages 703–728. Springer, 2020.
- [23] H. Kuwakado and M. Morii. Security on the quantum-type even-mansour cipher. In 2012 International Symposium on Information Theory and its Applications, pages 312–316, 2012.
- [24] G. Leander and A. May. Grover meets simon - quantumly attacking the FX-construction. In T. Takagi and T. Peyrin, editors, ASIACRYPT 2017, Part II, volume 10625 of LNCS, pages 161–178. Springer, Heidelberg, Dec. 2017.
- [25] B. Mennink and A. Szepieniec. XOR of PRPs in a quantum world. In T. Lange and T. Takagi, editors, Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, pages 367–383. Springer, Heidelberg, 2017.
- [26] R. C. Merkle and M. E. Hellman. On the security of multiple encryption. Communications of the ACM, 24(7):465–467, 1981.
- [27] A. Rosmanis. Tight bounds for inverting permutations via compressed oracle arguments. arXiv preprint arXiv:2103.08975, 2021.
- [28] P. W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. In 35th FOCS, pages 124–134. IEEE Computer Society Press, Nov. 1994.
- [29] D. R. Simon. On the power of quantum computation. SIAM journal on computing, 26(5):1474–1483, 1997.
- [30] E. E. Targhi and D. Unruh. Post-quantum security of the Fujisaki-Okamoto and OAEP transforms. In M. Hirt and A. D. Smith, editors, TCC 2016-B, Part II, volume 9986 of LNCS, pages 192–216. Springer, Heidelberg, Oct. / Nov. 2016.
- [31] S. Tessaro and A. Thiruvengadam. Provable time-memory trade-offs: Symmetric cryptography against memory-bounded adversaries. In A. Beimel and S. Dziembowski, editors, TCC 2018, Part I, volume 11239 of LNCS, pages 3–32. Springer, Heidelberg, Nov. 2018.
- [32] D. Unruh. Revocable quantum timed-release encryption. J. ACM, 62(6), Dec. 2015.
- [33] M. Zhandry. How to construct quantum random functions. In 53rd FOCS, pages 679–687. IEEE Computer Society Press, Oct. 2012.
- [34] M. Zhandry. A note on the quantum collision and set equality problems. Quantum Information and Computation, 15(7& 8), 2015.
- [35] M. Zhandry. How to record quantum queries, and applications to quantum indifferentiability. In A. Boldyreva and D. Micciancio, editors, CRYPTO 2019, Part II, volume 11693 of LNCS, pages 239–268. Springer, Heidelberg, Aug. 2019.
Appendix 0.A Probabilistic Analysis for Proof of Theorem 3.1
In this appendix we give a detailed probability analysis of Claim (i) from the proof of Theorem 3.1.
The view of when run by in is determined by , , and . These are chosen such that for and for . Consequently to ensure this matches the view from we need to show that choses uniformly from . It is clear that and are uniform. Furthermore, for so these are sampled correctly. Hence we can think of these values as fixed and argue that the distribution induced over is uniform over all permutations on .
Let , , and denote the event that . Let denote the event that for after Step 1. The second for loop of Step 3 programs to satisfy so is a necessary condition for . Note that requires values to have been sampled correctly in Step 1’s for loops where . Hence,
Let denote the event that Step 2 samples an which is consistent with . That is to say, that is chosen such that and for . The first for loop in Step 3 programs for . The second and third for loop in Step 3 programs to have values in so is a necessary condition for . Let and let denote the event that .
We can think of Step 2 as lazily sampling by first sampling for , then sampling for , and then sampling for . The event requires that the values sampled in this second step are the elements of and that on the third step is sampled for for each . Hence,
For to occur (conditioned on , , and ) the third for loop in Step 3 must sample values correctly, so . Putting everything together we have
So is uniformly distributed, as desired.