It is well known that classical computationally-secure cryptosystems may be susceptible to quantum attacks, i.e., attacks by adversaries able to process quantum information. A prominent example is the RSA public key cryptosystem, whose security is based on the hardness of factoring; it can be broken using a quantum computer running Shor’s efficient factoring algorithm. In this extended abstract, we review an argument which shows that a similar problem can arise even if a cryptosystem provides information-theoretic security. As long as its security analysis is carried out within classical information theory, attacks by quantum adversaries cannot in general be excluded.


Quantum Memory Security Proof Quantum World Legitimate Parti Classical Information Theory 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BBCM95]
    Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.: Generalized privacy amplification. IEEE Transaction on Information Theory 41(6), 1915–1923 (1995)MathSciNetCrossRefzbMATHGoogle Scholar
  2. [DM04]
    Dziembowski, S., Maurer, U.: Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology 17(1), 5–26 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  3. [DPVR09]
    De, A., Portmann, C., Vidick, T., Renner, R.: Trevisan’s extractor in the presence of quantum side information. arXiv:0912.5514 (2009)Google Scholar
  4. [GKK+07]
    Gavinsky, D., Kempe, J., Kerenidis, I., Raz, R., de Wolf, R.: Exponential separations for one-way quantum communication complexity, with applications to cryptography. In: Proceeding of the 39th Symposium on Theory of Computing, STOC (2007)Google Scholar
  5. [KLM07]
    Kaye, P., Laflamme, R., Mosca, M.: An introduction to quantum computing. Oxford University Press (2007)Google Scholar
  6. [KR11]
    König, R., Renner, R.: Sampling of min-entropy relative to quantum knowledge. IEEE Transactions on Information Theory 57, 4760–4787 (2011)MathSciNetCrossRefGoogle Scholar
  7. [KRBM07]
    König, R., Renner, R., Bariska, A., Maurer, U.: Small accessible quantum information does not imply security. Phys. Rev. Lett. 98, 140502 (2007)CrossRefGoogle Scholar
  8. [Lu04]
    Lu, C.-J.: Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology 17(1), 27–42 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  9. [Mau92]
    Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology 5(1), 53–66 (1992)MathSciNetCrossRefzbMATHGoogle Scholar
  10. [RSA78]
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  11. [Sho94]
    Shor, P.W.: Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings of the 35nd Annual Symposium on Foundations of Computer Science, pp. 124–134. IEEE Computer Society Press (1994)Google Scholar
  12. [Unr10]
    Unruh, D.: Universally Composable Quantum Multi-Party Computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 486–505. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. [Vad04]
    Vadhan, S.P.: Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology 17(1), 43–77 (2004)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Renato Renner
    • 1
  1. 1.Institute for Theoretical PhysicsETH ZurichSwitzerland

Personalised recommendations