A Quantum "Lifting Theorem" for Constructions of Pseudorandom Generators from Random Oracles

Jonathan Katz,Ben Sela
2024-01-30
Abstract:We study the (quantum) security of pseudorandom generators (PRGs) constructed from random oracles. We prove a "lifting theorem" showing, roughly, that if such a PRG is unconditionally secure against classical adversaries making polynomially many queries to the random oracle, then it is also (unconditionally) secure against quantum adversaries in the same sense. As a result of independent interest, we also show that any pseudo-deterministic quantum-oracle algorithm (i.e., a quantum algorithm that with high probability returns the same value on repeated executions) can be simulated by a computationally unbounded but query bounded classical-oracle algorithm with only a polynomial blowup in the number of queries. This implies as a corollary that our lifting theorem holds even for PRGs that themselves make quantum queries to the random oracle.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is about the security of pseudo - random number generators (PRGs) in the quantum computing environment. Specifically, the authors studied the security of pseudo - random number generators constructed from random oracles when facing quantum attackers. ### Research Background and Motivation 1. **Differences between Classical and Quantum Security**: Traditional pseudo - random number generators are considered secure in the classical computing environment. However, in the quantum computing environment, because quantum computers can use characteristics such as superposition and entanglement to perform more complex queries, the security of these generators may be affected. 2. **Random Oracle Model (ROM) and Quantum Random Oracle Model (QROM)**: In classical computing, the random oracle model is widely used to prove the security of encryption systems. However, when it comes to quantum computing, the quantum random oracle model needs to be considered because quantum attackers can evaluate the random oracle on the superposition of inputs. 3. **Limitations of Existing Work**: Although some work has attempted to extend the security results in the classical random oracle model to the quantum random oracle model, not all conversions can be successful in all cases. For example, Zhang et al. [14] showed that in some cases, quantum attackers can distinguish random oracles through a polynomial number of quantum queries, while classical attackers cannot do the same with the same number of classical queries. ### Main Contributions of the Paper The authors proved a "lifting theorem", which states that: if a pseudo - random number generator constructed based on a random oracle is unconditionally secure against a polynomial number of classical queries in the classical computing environment, then it is also unconditionally secure against a polynomial number of quantum queries in the quantum computing environment. Specifically: - **Lifting Theorem**: For any deterministic algorithm \(G\), if there exists a quantum attacker that can distinguish the output of \(G\) from a random string through \(Q\) quantum queries, then there exists a classical attacker that can achieve the same distinguishing effect through \(\text{poly}(Q)\) classical queries. - **Pseudo - Deterministic Quantum Algorithm**: The authors also proved that any pseudo - deterministic quantum oracle algorithm (i.e., a quantum algorithm that almost always returns the same value in multiple executions) can be simulated by a classical algorithm with unlimited computational resources but a limited number of queries, and the number of queries only increases polynomially. ### Important Conclusions - **Security Enhancement**: This theorem means that as long as a pseudo - random number generator is secure in the classical computing environment, it is also secure in the quantum computing environment, which provides a theoretical basis for designing quantum - secure encryption systems. - **Scope of Application**: Even if the pseudo - random number generator itself uses quantum queries in the construction process, the above results still hold. ### Technical Details To prove this result, the authors introduced some key technical tools, such as: - **Swapping Lemma**: Used to analyze the behavioral differences of quantum algorithms on different oracles. - **Reprogramming Lemma**: Used to prove that under certain conditions, quantum algorithms cannot distinguish between the original oracle and the randomly reprogrammed oracle. Through these technical tools, the authors constructed a series of hybrid experiments and gradually proved that the abilities of classical attackers and quantum attackers to distinguish the output of pseudo - random number generators are equivalent. ### Summary This paper solves the security problem of pseudo - random number generators in the quantum computing environment and provides a strong theoretical framework to ensure that pseudo - random number generators that are secure in the classical computing environment are also secure in the quantum computing environment. This result is of great significance for designing and verifying quantum - secure encryption systems.