ここから本文です
研究室
情報セキュリティ研究室

情報セキュリティ研究室

3rd ETSI/IQC Workshop on Quantum-Safe Cryptography参加報告

The ETSI/IQC Workshop on Quantum-Safe Cryptography is a workshop related to quantum security and quantum-safe cryptography. The 3rd workshop was held in Seoul, Korea for three days, from October 5th to October 7th. There were around 80 participants for this workshop. Yun-Ju Huang (ISIT researcher) gave the presentation of the MQ(Multivariate Quadratic)-challenge project in Session 8: Most Recent Developments in Quantum Safe Crypto.

  • Web site of the workshop: http://www.etsi.org/index.php/news-events/events/949-etsi-iqc-3
  • Acknowledgements: This research is commissioned by “Strategic Information and Communications R&D Promotion Programme (SCOPE), no. 0159-0016” Ministry of Internal Affairs and Communications, JAPAN.

First day: 2015/10/5

  • Session 1: Introductory session
    Time: 9:00 ‐ 10:15
    Session Chairman: Gaby Lenhart, ETSI
    The welcome words, and setting up the topics of this conference, which is related to the post-quantum security and post-quantum safe cryptography.
  • Session 2: World Tour
    Time: 10:45 ‐ 12:25
    Session Chairman: Colin Whorlow, CESG

    1. Quantum‐Safe Crypto in Korea
      June‐Koo Rhee, IITP, Network Creative Planner
      Introduction of the current Quantum-safe cryptography construction in Korea. Several programs had been setting up and started in 2015, especially in the QKD (Quantum Key Distribution) area.
    2. The Chinese QKD Network
      Hong Xiang, University of Chongqing
      Introduction of the current Quantum-safe cryptography construction in China. Currently, a QKD over 700km and through a river had been setting up. Three QKD research centers had been established in An-Hui.
    3. Quantum‐Safe Crypto in Europe
      Ales Fiala, EC DG CONNECT, Head of Future Emerging Technologies Unit
      Introduction of the FET (Future & Emerging Technologies) funding related to Quantum-safe cryptography, including Atomic, molecular and solid-state systems for quantum processing, interfaces between quantum communication, computation and storage, sources and detectors for single photons, atoms, ions, and quantum repeaters.
    4. Canadian overview
      Michele Mosca, University of Waterloo
      Introduction of Quantum-safe cryptography. Including the requirements of valid time of the scheme, the infrastructure without cheating, the importance of QKD system.
    5. The UK Quantum Hub
      Gerald Buller, Heriot‐Watt University
      Introduction of the post quantum program team in the UK. There is a new subject which focus on the quantum-safe cryptography. Also, introduce the QKD construction in UK.
  • Session 3: Joint Global Efforts
    Time: 13:30 ‐ 15:45
    Session Chairman: Nicolas Gisin, University of Geneva

    1. QCRYPT summary
      Masahide Sasaki, NICT
      Introduction of the current Post-Quantum Study in Japan. Showing the current study of the qubits operations.
    2. Update on ETSI ISG QKD
      Marco Lucamarini, Toshiba
      Introduction of the ISG (Industrial Specification Group) on the QKD system, including the device and communication channel parameters for QKD deployment, defining a common language between QKD supplier and its user, make a characterization of optical components for QKD systems and deciding the parameters and test procedures for components that impact on system security. Also stated the implementation security: Trojan horse attacks in one-way QKD systems.
    3. Update on ETSI ISG QSC
      Mark Pecen, Approach Infinity
      Introduction of the background of ETSI, which is a non-profit organization focus on the research and application of communication over any IC production, including mobile, radio and internet in Europe. Showing the importance of ISG (industrial standard group) and its role in the quantum safe cryptography.
    4. Update on PQCRYPTO project
      Andreas Hülsing, TU Eindhoven
      Showing the software study of the post quantum cryptography in the TU/E. Introduction the project, funding and the group members, study topics such as the fast implementation.
    5. Update on SAFEcrypto project
      Markku‐Juhani O. Saarinen, Queen’s University Belfast
      Showing the current project in Queen’s University Belfast in UK, which focus on the cryptanalysis respect to different quantum-safe schemes.
    6. Cloud Security Alliance ‐ Quantum‐Safe Security Working Group
      Don Hayford, Battelle
      Introduction of the organization of CSA (cloud security alliance), which works with the industries, governments and high-education. It serves to the cloud security user certifications, promotes the use of best practices for providing security assurance within Cloud Computing, and provides education on the uses of Cloud Computing to help secure all other forms of computing.
  • KEYNOTE: QKD a Potential Solution for Network Function Virtualization (NFV)?
    Time: 16:15 ‐ 16:45
    Gaby Lenhart, ETSI
    Introduction of the ETSI NFV ISG structures, which involves to decouple network functions from proprietary hardware appliances to software installed on standard hardware and automation. It also shows the construction of the infrastructure and the network structures.
  • Session 4: Discussion: Computational Constraints and Considerations for Post‐Quantum Cryptography and Security: An Industry Perspective”
    Time: 16:45 ‐ 18:00
    Session Chairman: Jennifer Fernick, IQC
    Invieted guest:

    • Oscar Garcia‐Morchon, Phillips
    • Sean Kwak, SKT
    • Norbert Lütkenhaus, evolution
    • Gregoire Ribordy, IDQ
    • Douglas Stebila, Queensland University of Technology
    • Scott Totzke, ISARA Corp.

      A panel discussion on several topics, including the construction of QKD between industry and government, education, as well as the schedule for an industry to complete the goal of post quantum security.

Second day: 2015/10/6

  • Session 5: Recent Developments in Quantum Cryptography
    Time: 9:00 ‐ 11:00
    Session Chairman: Masahide Sasaki, NICT

    1. Long distance QKD
      Rupert Ursin, IQOQI
      Showing the implementation bottlenecks of the construction QKD systems, involves the signal decline and noisy.
    2. Handheld QKD
      John Rarity, University of Bristol
      Introduction of a new spec of QKD which is like embedded system. It is a new idea, tiny, however the resources consumption is a problem.
    3. State of the art in quantum‐memories and quantum‐repeaters
      Nicolas Gisin, Université de Genève
      Showing the current results in implementing a quantum memory and a quantum repeaters. The current effort can build up a QKD over 307km.
    4. Satellite QKD
      Thomas Jennewein, IQC
      A project of IQC launched in Waterloo. This shows the QKD developments in the Canada using the satellite infrastructures.
    5. Quantum digital signatures
      Erika Anderssen, Heriot‐Watt University
      Introducing a signature scheme using the quantum computing. No forging and non-repudiation, and since it is not computing-secured, using QKD makes it is secure in physics.
  • Session 6: Threats to Conventional Cryptography
    Time: 11:30 ‐ 12:45
    Session Chairman: Marco Lucamarini, Toshiba

    1. Quantum computing with superconducting qubits
      John Martinis, University of California Santa Barbara
      Showing the experimental results of the qubits operations, which is the basic in quantum computing. It shows the trapping of the ion.
    2. Quantum computing with ion traps
      Tracy Northrup, Universität Innsbruck
      Explain the ion traps, and how it affects the conventional security. Since the ion changes its status in an interval, the problem in the algorithm is that how can we preserves the data through out the ion trapping.
    3. Conventional attacks
      Jung Hee Cheon, Seoul National University
      Showing the conventional attacks towards the quantum computing, which related to the ion status.
  • Session 7: QKD Certification
    Time: 14:00 ‐ 16:00
    Chairman: Sean Kwak, SKT

    1. Metrology for quantum cryptography: the European effort
      Marco Genovese, INRIM
      Showing the current quantum photonic technologies, including the parameters of the receiver’s detector and the probability of the detector.
    2. High security grade certification of quantum devices
      Gregoire Ribordy, IDQ
      Showing the implementation of QKD in IDQ, which is certified to NIST standards.
    3. QKD security certification
      Kiyoshi Tamaki, NTT
      Showing the QKD construction in NTT, which is important for the communication techonology in Japan.
    4. Certification attempts in Korea
      Daesung Kwon, NSRI
      Showing the construction of the certificates system in Korea using the QKD, including the efforts between government and industries. The project had been launched in 2015.
    5. Secret basis shift resisting detector manipulation attack
      Yuri Kurochkin, Russian Quantum Center
      Showing the infrastructures to protect QKD from detector manipulation and showing the quantum cryptography protocol with floating basis.
  • Session 8: Most Recent Developments in Quantum Safe Crypto
    Time: 16:20 ‐ 18:00
    Chairman: Mark Pecen, Approach Infinity Inc.

    1. Everlasting security
      Johannes Buchmann, TU Darmstadt
      An introduction of a lifetime time-stamp scheme, which uses the recursive signature to guarantee the data validity and authority in certain time interval. The security had been proved.
    2. Security analysis of quantum safe cryptography
      Tsuyoshi Takagi, Kyushu University
      Introducing the current security parameters of quantum-safe cryptography, including the multivariate polynomial crypto system and latticed-based crypto system, and make the security analysis.
    3. Hash‐based signatures
      Andreas Hülsing, TU Eindhoven
      Introduction of the signatures schemes using the hash function. Prove the security of the protocol.
    4. Design principles for HFEv‐ based signature schemes
      Jintai Ding, University of Cincinnati
      Introduction of the HFEv(Hidden Field Equations vinegar)-based signature schemes, which comes from the idea of HFE with some vinegar input and removes some noisy input. The security had been proved.
    5. Recent updates of multivariate quadratic challenge
      Yun Ju Huang, ISIT
      The reports of the updating submission in the MQ-challenge project, and give the security analysis of the current parameters in solving the MQ system.