-
Towards a Unified Quantum Protocol Framework: Classification, Implementation, and Use Cases
Authors:
Shraddha Singh,
Mina Doosti,
Natansh Mathur,
Mahshid Delavar,
Atul Mantri,
Harold Ollivier,
Elham Kashefi
Abstract:
We present a framework for the unification and standardization of quantum network protocols, making their realization easier and expanding their use cases to a broader range of communities interested in quantum technologies. Our framework is available as an open-source repository, the Quantum Protocol Zoo. We follow a modular approach by identifying two key components: Functionality, which connect…
▽ More
We present a framework for the unification and standardization of quantum network protocols, making their realization easier and expanding their use cases to a broader range of communities interested in quantum technologies. Our framework is available as an open-source repository, the Quantum Protocol Zoo. We follow a modular approach by identifying two key components: Functionality, which connects real-world applications; and Protocol, which is a set of instructions between two or many parties, at least one of which has a quantum device. Based on the different stages of the quantum internet and use-case in the commercialization of quantum communication, our framework classifies quantum cryptographic functionalities and the various protocol designs implementing these functionalities. Towards this classification, we introduce a novel concept of resource visualization for quantum protocols, which includes two interfaces: one to identify the building blocks for implementing a given protocol and another to identify accessible protocols when certain physical resources or functionalities are available. Such classification provides a hierarchy of quantum protocols based on their use-case and resource allocation. We have identified various valuable tools to improve its representation with a range of techniques, from abstract cryptography to graphical visualizations of the resource hierarchy in quantum networks. We elucidate the structure of the zoo and its primary features in this article to a broader class of quantum information scientists, physicists, computer science theorists and end-users. Since its introduction in 2018, the quantum protocol zoo has been a cornerstone in serving the quantum networks community in its ability to establish the use cases of emerging quantum internet networks. In that spirit we also provide some of the applications of our framework from different perspectives.
△ Less
Submitted 2 December, 2023; v1 submitted 19 October, 2023;
originally announced October 2023.
-
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems
Authors:
Shen Wang,
Mahshid Delavar,
Muhammad Ajmal Azad,
Farshad Nabizadeh,
Steve Smith,
Feng Hao
Abstract:
Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling u…
▽ More
Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user's phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.
△ Less
Submitted 24 September, 2023; v1 submitted 9 June, 2023;
originally announced June 2023.
-
A Unified Framework For Quantum Unforgeability
Authors:
Mina Doosti,
Mahshid Delavar,
Elham Kashefi,
Myrto Arapinis
Abstract:
In this paper, we continue the line of work initiated by Boneh and Zhandry at CRYPTO 2013 and EUROCRYPT 2013 in which they formally define the notion of unforgeability against quantum adversaries specifically, for classical message authentication codes and classical digital signatures schemes. We develop a general and parameterised quantum game-based security model unifying unforgeability for both…
▽ More
In this paper, we continue the line of work initiated by Boneh and Zhandry at CRYPTO 2013 and EUROCRYPT 2013 in which they formally define the notion of unforgeability against quantum adversaries specifically, for classical message authentication codes and classical digital signatures schemes. We develop a general and parameterised quantum game-based security model unifying unforgeability for both classical and quantum constructions allowing us for the first time to present a complete quantum cryptanalysis framework for unforgeability. In particular, we prove how our definitions subsume previous ones while considering more fine-grained adversarial models, capturing the full spectrum of superposition attacks. The subtlety here resides in the characterisation of a forgery. We show that the strongest level of unforgeability, namely existential unforgeability, can only be achieved if only orthogonal to previously queried messages are considered to be forgeries. In particular, we present a non-trivial attack if any overlap between the forged message and previously queried ones is allowed. We further show that deterministic constructions can only achieve the weaker notion of unforgeability, that is selective unforgeability, against such restricted adversaries, but that selective unforgeability breaks if general quantum adversaries (capable of general superposition attacks) are considered. On the other hand, we show that PRF is sufficient for constructing a selective unforgeable classical primitive against full quantum adversaries. Moreover, we show similar positive results relying on Pseudorandom Unitaries (PRU) for quantum primitives. These results demonstrate the generality of our framework that could be applicable to other primitives beyond the cases analysed in this paper.
△ Less
Submitted 1 October, 2021; v1 submitted 25 March, 2021;
originally announced March 2021.
-
Client-Server Identification Protocols with Quantum PUF
Authors:
Mina Doosti,
Niraj Kumar,
Mahshid Delavar,
Elham Kashefi
Abstract:
Recently, major progress has been made towards the realisation of quantum internet to enable a broad range of classically intractable applications. These applications such as delegated quantum computation require running a secure identification protocol between a low-resource and a high-resource party to provide secure communication. In this work, we propose two identification protocols based on t…
▽ More
Recently, major progress has been made towards the realisation of quantum internet to enable a broad range of classically intractable applications. These applications such as delegated quantum computation require running a secure identification protocol between a low-resource and a high-resource party to provide secure communication. In this work, we propose two identification protocols based on the emerging hardware secure solutions, the quantum Physical Unclonable Functions (qPUFs). The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice-versa. Unlike existing identification protocols based on Quantum Read-out PUFs which rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties. We provide a comprehensive comparison between the two proposed protocols in terms of resources such as quantum memory and computing ability required in both parties as well as the communication overhead between them.
△ Less
Submitted 1 October, 2021; v1 submitted 8 June, 2020;
originally announced June 2020.
-
Quantum Physical Unclonable Functions: Possibilities and Impossibilities
Authors:
Myrto Arapinis,
Mahshid Delavar,
Mina Doosti,
Elham Kashefi
Abstract:
A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in practical settings. Recently, the inherent unclonability of quantum states has been exploited to derive the quantum analogue of PUF as well as new pr…
▽ More
A Physical Unclonable Function (PUF) is a device with unique behaviour that is hard to clone hence providing a secure fingerprint. A variety of PUF structures and PUF-based applications have been explored theoretically as well as being implemented in practical settings. Recently, the inherent unclonability of quantum states has been exploited to derive the quantum analogue of PUF as well as new proposals for the implementation of PUF. We present the first comprehensive study of quantum Physical Unclonable Functions (qPUFs) with quantum cryptographic tools. We formally define qPUFs, encapsulating all requirements of classical PUFs as well as introducing a new testability feature inherent to the quantum setting only. We use a quantum game-based framework to define different levels of security for qPUFs: quantum exponential unforgeability, quantum existential unforgeability and quantum selective unforgeability. We introduce a new quantum attack technique based on the universal quantum emulator algorithm of Marvin and Lloyd to prove no qPUF can provide quantum existential unforgeability. On the other hand, we prove that a large family of qPUFs (called unitary PUFs) can provide quantum selective unforgeability which is the desired level of security for most PUF-based applications.
△ Less
Submitted 2 June, 2021; v1 submitted 4 October, 2019;
originally announced October 2019.
-
Hermite-Hadamard's Type Inequalities on a Ball
Authors:
M. Rostamian Delavar
Abstract:
Some trapezoid and mid-point type inequalities related to the Hermite-Hadamard inequality for the map**s defined on a ball in the space are obtained.
Some trapezoid and mid-point type inequalities related to the Hermite-Hadamard inequality for the map**s defined on a ball in the space are obtained.
△ Less
Submitted 25 May, 2019;
originally announced May 2019.
-
Hermite-Hadamard's Mid-Point Type Inequalities for Generalized Fractional Integrals
Authors:
M. Rostamian Delavar
Abstract:
Some Hermite-Hadamard's mid-point type inequalities related to Katugampola fractional integrals are obtained where the first derivative of considered map**s is Lipschitzian or convex. Also some mid-point type inequalities are given for Lipschitzian map**s, with the aim of generalizing the results presented in previous works. Finally as an application, some generalized inequalities in connectio…
▽ More
Some Hermite-Hadamard's mid-point type inequalities related to Katugampola fractional integrals are obtained where the first derivative of considered map**s is Lipschitzian or convex. Also some mid-point type inequalities are given for Lipschitzian map**s, with the aim of generalizing the results presented in previous works. Finally as an application, some generalized inequalities in connection with special means are provided.
△ Less
Submitted 17 February, 2019;
originally announced February 2019.
-
Trapezoidal type inequalities related to h-convex functions with applications
Authors:
M. Rostamian Delavar,
S. S. Dragomir
Abstract:
A map** M(t) is considered to obtain some preliminary results and a new trapezoidal form of Fejer inequality related to the h-convex functions. Furthermore the obtained results are applied to achieve some new inequalities in connection with special means, random variable and trapezoidal formula.
A map** M(t) is considered to obtain some preliminary results and a new trapezoidal form of Fejer inequality related to the h-convex functions. Furthermore the obtained results are applied to achieve some new inequalities in connection with special means, random variable and trapezoidal formula.
△ Less
Submitted 1 January, 2018;
originally announced January 2018.
-
A refinement of Hardy Inequality via superquadratic function
Authors:
Mohsen Kian,
M. Rostamian Delavar
Abstract:
A refinement of the Hardy inequality has been presented by use of superquadratic function.
A refinement of the Hardy inequality has been presented by use of superquadratic function.
△ Less
Submitted 16 May, 2017;
originally announced May 2017.