Abstract
We propose a scheme for authentication of physical keys that are materialized by optical multiplescattering media. The authentication relies on the optical response of the key when probed by randomly selected coherent states of light, and the use of standard wavefrontshaping techniques that direct the scattered photons coherently to a specific target mode at the output. The quadratures of the electromagnetic field of the scattered light at the target mode are analysed using a homodyne detection scheme, and the acceptance or rejection of the key is decided upon the outcomes of the measurements. The proposed scheme can be implemented with current technology and offers collision resistance and robustness against key cloning.
Introduction
Entity authentication (sometimes also referred to as identification) is one of the most important cryptographic tasks, in which one party (the verifier) obtains assurance that the identity of another party (the claimant) is as declared, thereby preventing impersonation^{1}. Techniques for identification typically rely on (i) something that the claimant knows (e.g., a secret password or numerical key); (ii) something that the claimant possesses (e.g., a physical token or card); or (iii) something inherent (e.g., biometrics). The first two techniques are purely cryptographic and are used extensively for everyday tasks (such as transactions in automatic teller machines). High levels of security can be achieved by means of dynamic entity authentication protocols (EAPs) that combine techniques (i) and (ii), through a challengeresponse mechanism^{1,2}. More precisely, before any authentication, the user is given a physical key (token or smart card) and a short personal identification number (PIN), which has to be kept secret. The authentication then relies on a publiclyknown cryptographic algorithm, such as for instance a symmetric algorithm involving a numerical key that is shared between the verifier and the token. First, the PIN is used to verify the user to the token; if the PIN is correct, the verifier proceeds by generating a number of random and independent numerical challenges, and for each one of them the token computes a response based on the implemented algorithm and the shared key. The user is authenticated only if all of the responses agree with the ones expected by the verifier. An impersonation attack against such a dynamic EAP is difficult but not impossible, especially when the PIN is not well protected. The main weakness of the protocol stems from the fact that traditional physical keys can be cloned^{3}, thereby enabling potential hackers to impersonate successfully legitimate users.
The development of cloningresistant EAPs is of particular importance for the field of cryptography, and optical schemes are currently considered to be among the most promising candidates^{3}. In optical EAPs, the physical key is materialized by an optical multiplescattering random medium, which is probed (or interrogated) by light pulses (probes)^{3,4,5,6,7,8,9,10,11,12,13}. Such disordered keys are considered to be practically unclonable because their full characterization involves a large number of degrees of freedom, and they are usually referred to as physical unclonable keys (PUKs) or functions (PUFs). Their optical response to a probe depends on the details of their internal disorder, as well as on different parameters of the probe. Typically, an optical EAP has two stages^{4,5}. The enrolment stage takes place only once, before the key is given to the user, and aims at its full characterization by the authority responsible for the distribution of the keys. To this end, the key is subject to a large number of random challenges (i.e., it is interrogated by large number of probes with different parameters), and all of the challengeresponse pairs (CRPs) are stored in a database together with the PIN. In the verification stage, the user inserts his key in a verification device and types in his secret PIN. If the PIN is correct, the verifier has to decide whether the key with the given PIN is authentic or not. Assuming that the verifier has access to the database, the verification is achieved by interrogating the key with a moderate number of probes, whose parameters are chosen at random from the recorded challenges in the database, and by checking whether the corresponding responses agree with those in the database.
The cloning resistance of optical PUKs is sufficient for preventing impersonation attacks in a tamperresistant scenario, typically discussed and analysed in the literature^{3,4,5,12}, where an adversary does not have access to the probes. In scenarios where an adversary may actually have access to the probes that are sent to the optical PUK, the nature of these probes (challenges) plays a significant role in the security of the authentication protocol. When the probe is classical light, the controlled parameters are classical quantities such as the incidence angle, the intensity, or the wavefront of the field^{4,5,6,10}. Hence, an adversary who has access to the verification setup is, in principle, able to read out, copy, and manipulate the classical information carried by the probes, without being detected. The security of optical EAPs may increase considerably by using quantum instead of classical probes. In this case, information gain about the quantum state of a probe is limited by fundamental laws of quantum physics, and can be obtained only at the cost of disturbing the quantum state of the probe^{14}. In this spirit, Goorden et al. proposed and implemented an EAP, in which the challenges are encoded on attenuated laser pulses with shaped wavefronts^{9,11}. The implementation of this scheme requires photoncounting detectors, and acceptance or rejection of a key is decided upon the number of photodetection events.
Here we propose a new optical EAP, in which information is carried by the continuous quadrature components of the quantized electromagnetic field of the probe. Such a continuousvariable encoding has been shown to offer practical advantages in quantum key distribution^{15}. The implementation of our protocol relies on standard wavefrontshaping and homodynedetection techniques, and is within reach of current technology. Assuming a tamperresistant verification setup, we show that the protocol offers highly desirable features, such as collision resistance and robustness against key cloning, which are necessary for the protocol to be useful in practice^{4,5}.
Results
Authentication setup
A realization of the proposed EAP is shown in Fig. 1, and consists of the probe state preparation setup, the interrogation chamber, and the homodynedetection (HD) setup (chamber). Except for the HD, the scheme is similar to the wavefrontshaping setup used for the control of light scattered by a disordered multiplescatering medium (to be referred to hereafter as the key)^{16,17,18,19,20,21,22,23,24,25}. The laser beam at wavelength λ is split into two parts: a weak probe that is sent to the wavefront shaping setup, and a strong local oscillator, which will serve as a reference in the HD of the scattered light. The key is assumed to have a slab geometry with thickness L and mean free path . In the diffusive regime, i.e. for , where L_{abs} is the absorption length, light undergoes multiple scattering events in the key, and the process can be described in terms of a finite number of discrete input and output transverse spatial modes^{26,27,28,29}. Using a phaseonly spatial light modulator (SLM), one can control the phases of the incoming modes, thereby directing coherently the main part of the scattered light into a prescribed outgoing mode (to be referred to hereafter as the target mode)^{16,17,18,19,20,21,22,23,24,25}. For a given key, one can select different target modes by changing accordingly the phase mask of the SLM. Moreover, different output transverse modes can be addressed by a singlemode fiber (SMF), which can be translated on the output (optical) plane in a controlled manner, provided that the overall imaging system is optimized so that the diameter of a single speckle grain matches the diameter of the mode of the SMF^{23,24}.
Formalism
Throughout this work we adopt the Heisenberg picture, because it facilitates the comparison with the classical setting. Following existing literature^{26,27,28,29}, for the sake of simplicity we assume incoming and outgoing modes on each side of the key (see Fig. 2). However, our analysis is expected to remain valid more generally, with appropriate adjustment of the formulas below. In the setup of Fig. 1 the target mode is one of the outgoing modes on the left of the key (labelled by ), which is coupled to a SMF, and let be the corresponding annihilation operator for a photon (see Fig. 2). Only incoming modes on the left of the key are initially populated and are controlled by the SLM, whereas all the incoming modes on the right of the key are in vacuum. Hence, one readily obtains^{28,29}
where 〈·〉 denotes quantum mechanical expectation value, is the annihilation operator for a photon in the j–th incoming mode on the left of the key, and {R_{s,j}} are the electricfield reflection coefficients from the j–th incoming mode to the target mode. The latter depend on the realization of the disorder in the medium and can be treated as independent complex Gaussian random variables that satisfy^{26,27,28,29}
where the overline denotes (classical) ensemble average over all disorder realizations. The main assumptions underlying this “Gaussianstatistics model" are summarized in the Methods.
By analogy with Eqs (1) and (2), the coupling of the SMF at the input of the verification setup to the incoming modes at the exit of the SLM can be modelled by equations of the form
where is the annihilation operator for a photon in the mode of the fiber and g_{j} is the electricfield transmission coefficient from the fiber’s mode to the j–th incoming mode. Analogous models have been employed in various contexts in physics for the description of outcoupling from cavities and waveguides^{30,31}. The specific form of the coefficients {g_{j}} depends on the details of the mechanism that governs the coupling between the mode of the fiber and the modes at the exit of the SLM, and is not needed for the purpose of this work. For what follows, however, it is important to emphasize that these coefficients are in general complex numbers that satisfy , where the constant τ accounts for possible losses. Contrary to the reflection coefficients {R_{s,j}}, the coefficients {g_{j}} are independent of the key, and are expected to be fully determined by the details of the verification setup (e.g., wavelength of the light, cross section of the fiber, separation of various elements, etc). Throughout this work we will be interested in a fixed verification setup, with publicly known specifications, which means that {g_{j}} have to be considered as publicly known constants as well.
The set of angles in Eq. (4) refer to the phase mask of the SLM, and may or may not be optimized with respect to the particular target mode (denoted by s). In the absence of optimization, the scattered light is distributed among the various modes at the output, with the precise form of the corresponding intensity distribution (speckle pattern) depending on the realization of disorder. By optimizing the phase mask of the SLM one can maximize the concentration of scattered light in the target mode s. The optimization may involve feedback algorithms, in which the phase mask of the SLM is optimized with respect to the intensity (or power) of the scattered light in the target mode^{17,32,33}. Alternatively, an optimal phase mask can be found by means of the experimental estimation of the scattering matrix of the key^{22}. The directional concentration of scattered light in the target mode is never complete, because light will be unavoidably scattered in other outgoing modes as well. Hence, the amount of control one has over the propagation of light in the disordered key is usually quantified by the intensity enhancement i.e., the ratio of the intensity in the target mode after optimization, to the ensembleaverage intensity in the absence of optimization^{17,32,33}. Generalizing this classical definition to a quantum setting we have
where is the mean number of scattered photons in the target mode in the presence of an optimized SLM for a single realization of disorder, whereas in the denominator is the corresponding ensembleaverage mean number of photons in absence of optimization. From now on, will denote the optimal phase mask that maximizes the number of scattered photons in the target mode s, for a given key. For the sake of simplicity, the dependence of on the key (i.e., on the realization of the disorder), will not be explicitly shown.
The above formalism is rather general, in the sense that so far there have been no explicit assumptions about the quantum state of the probes that are used in the interrogation of the key. The proposed EAP uses coherent states of light, and relies on standard HD techniques. In particular, we treat the states of the local oscillator (LO) and the probe as singlemode coherent states, α_{LO}〉 and respectively, where μ_{P} is the mean number of photons in the probe and φ_{P} is a relative phase with respect to the LO. The coherent state α_{P}〉 is an eigenstate of with eigenvalue α_{P}, and thus
Using Eqs (1), (4) and (7) we obtain
with the case of uniform illumination of the SLM obtained for . The analogy of Eq. (8) to equations used in the analysis and the implementation of wavefrontshaping with classical light sources^{17}, stems from the use of coherent probe states, and the preservation of coherence throughout the wavefrontshaping and the scattering. The latter is reflected in the linearity of the inputoutput equations (1–5), which in view of Eq. (7) imply
Equation (8) determines the expectation value of the electric field in the mode of the fiber. The quadrature amplitudes of the field can be measured by means of HD, with the LO serving as the required reference^{30}. By adjusting the LO phase θ, one measures the generalized quadrature amplitude . Assuming that the LO field is much stronger than the total scattered field (i.e., for ), the outcome of such a measurement is a real random number q which, to a good accuracy, follows a Gaussian distribution^{34}
with the shot noise , where η ≤ 1 is the detection efficiency. Hence, the measurement of the quadrature is equivalent to sampling from the distribution (10). Throughout this work we focus on the measurement of the real and imaginary quadratures, corresponding to and , respectively. The corresponding Gaussian photocount distributions are centred at and , for θ = 0 and π/2, respectively. In the framework of our protocol, we will refer to as the response of the key to the probe state α_{P}〉.
The above expressions and observations are applicable to the cases of both optimized and nonoptimized SLM. Let denote the response of the key in the absence of SLM optimization, where and are the centres of the photocount distributions for θ = 0 and π/2, respectively. Both of and depend on the realization of the disorder, and statements can be made only for ensemble averages. Using Eqs (8) and (9) for , as well as the independence of {R_{s,j}} and Eq. (3), one readily obtains
where is the total mean number of photons in the challenge, at the exit of the SLM. Hence, using the above relation between and we have
For a given realization of disorder, when the SLM is optimized so that the scattered light is mainly directed to the target mode s, the response of the key will be denoted by , and the photocount distributions for θ = 0 and π/2 are expected to be centred at and , respectively. Using Eq. (9) for , and Eq. (11) one readily obtains from Eq. (6)
Finally, an important quantity for what follows is the conditional probability for the outcome q in a HD along θ to fall within the interval (bin) for some δ such that . From Eq. (10) and the above discussion, we have
which is independent of , and depends only on the ratio δ/σ. This is because for both values of θ, the bin is centred at the centre of the Gaussian distribution of Eq. (10). Moreover, Eq. (14) is valid for both optimized and nonoptimized SLM, provided that the bin is defined for and , respectively. In either case, it should be kept in mind that according to Eq. (8), and depend on the probe state α_{P}〉, on the key (through the reflection coefficients of the scattering matrix), as well as on the phasemask of the SLM. One cannot know or without knowing all of these pertinent quantities.
Entity authentication protocol
We assume that the setups used for the enrolment and the verification stages of the EAP are the same. All of their specifications (i.e., losses, imperfections, detection efficiency, wavelength of light, etc) together with δ and convergence parameters ε, , are publicly known. As will become clear below, ε and 1 − ζ are the error and the confidence levels in the verification stage of the EAP, respectively. Hence, becomes a publicly known constant that will be denoted by P_{in}. For the sake of clarity, we will discuss the protocol in the framework of coherent states with the same amplitude but different phases. However, the protocol can also be implemented with states that differ both in phase and in amplitude, and the generalization of the following results and observations to this case is straightforward. Let
be a publicly known set of coherent probe states, with and N > 2. Note that the states in are uniquely identified by the values of the integer k.
Enrolment stage
Each key is associated with a single target mode s chosen at random from the set of all accessible target modes in the setup. In the enrolment stage, the first task of the enroller is to find the optimal phase mask for the SLM that directs the scattered light to the particular target mode. A classical light source and known techniques^{17,21,22} can be used to this end, because an optimal phase mask works in the same way in the classical and the quantum regimes^{19,23,25}. Subsequently, for each the key is interrogated by many probes (each one prepared in α_{k}〉), with the phase mask of the SLM set to , and for each probe one of the quadratures of the field in the target mode is measured. In a standard HD setup, the enroller has to switch randomly between θ = 0 and θ = π/2 so as to obtain sufficiently large samples for a reliable estimation of both and , and thus of the corresponding optimized response . For the sake of clarity, the dependence of on the scattering matrix of the key and the phase mask of the SLM is not explicitly shown here. It is essential for each one of the possible probe states, to estimate the response with accuracy higher than the accuracy to be used in the verification. For a fixed probe state α_{k}〉, the samples that are obtained for the estimation of either of the two quadratures are assumed to be independent and identical. Hence, from the centrallimit theorem we have that, with high probability, the absolute error in the estimation of either or does not exceed , where M_{e} is the sample size used in the estimation of one of the quadratures for the given probe state (see Methods below). Given that the enrolment is performed only once by the authority that creates and distributes the keys, well before they are given to the users, it is reasonable to assume that the enroller has all the freedom to obtain as large samples as needed for the error to satisfy . Repeating the same procedure for both quadratures and for all of the states in , the enroller can form a list of challengeresponse pairs (CRPs), with each pair given by , which has to be stored in a secure database and will be used for the authentication of the key.
Verification stage
When a user gives the key for authentication, the verifier contacts the database over a secure authenticated classical channel to obtain the pertinent list of CRPs. The verification stage involves identical sessions, and proceeds as follows.
 1
Set the phase mask of the SLM to , and position the SMF at the output to match the corresponding target mode s.
 2
Prepare the probe in the coherent state α_{P}〉, chosen at random from a uniform distribution over , and send it to the wavefrontshaping setup.
 3
Measure at random the real or the imaginary quadrature of the scattered field in the target mode by setting the LO phase to θ = 0 or π/2, respectively. Both quadratures are equally probable.
 4
Check whether the outcome of the measurement falls within the bin or not, where θ is the angle that has been chosen in step (3).
 5
Repeat steps (2–4) M times, and estimate , where M_{in} is the total number of outcomes that have fallen within the bins.
 6
If accept the key, otherwise reject.
Given that the verifier is the one who chooses randomly the CRP in each session, he is also able to choose the bin so that its centre coincides with the centre of the expected photodetection distribution for the true key (namely, and for θ = 0 and π/2, respectively). Hence, in the limit of , one expects p_{in} → P_{in}. On the contrary, as will be explained below, a false key will result in estimates that deviate from P_{in}, and thus the verifier could always detect such a key if he could perform an arbitrarily large number of sessions. This is, however, not possible in practice. Our EAP can be useful in practice only if the verification stage is quick, which means that only a moderate number of sessions can be applied during verification. As a result, there will be statistical deviations of the empirical probability p_{in} from the theoretical probability P_{in}, in addition to the deviations that are due to a false key. Distinguishing between deviations of different origin is impossible, but the verifier can bound the statistical deviations by choosing M sufficiently large. According to the Chernoff bound (see Methods)^{35,36,37}, when the true key is interrogated by M > M_{th} probes, where
for some and , then the probability for the estimate p_{in} to deviate from P_{in} by more than ε is bounded from above by ζ, i.e., . Hence, for any M > M_{th}, the verifier can be 100(1 − ζ)% confident that for the true key the statistical deviations cannot exceed ε. This implies that if the verifier obtains an estimate such that p_{in} − P_{in} ≥ ε, then he can be confident that with high probability the observed deviations are due to a false key.
In closing, we would like to emphasize once more the fundamental difference between the enrolment and the verification stages. By definition, the enrolment is performed only once, by the authority that creates and distributes the keys, and it aims at the accurate characterization of a key with respect to its response to all of the possible probe states. It is natural, therefore to assume that the enroller has all the time needed so that the accuracy in the estimation of the response of the key to a particular probe state, is considerably higher than the accuracy in the verification stage. By contrast, the verification stage takes place each time the holder of a key has to be authenticated, and the verifier has to decide on the acceptance or rejection of a key as quickly as possible. Hence, it is crucial for the sample size in the verification stage to be “small” enough so that it can be obtained within a reasonable period of time (say seconds), and at the same time “large” enough to ensure a reliable verification. This point will be made clearer in the following sections.
Security aspects
In order for our EAP to be useful in practice, it has to offer collision resistance and high sensitivity to the randomness of the key^{4,5}. Assuming a tamperresistant verification setup, in this section we address both of these issues. For the security analysis, it is worth keeping in mind two aspects of the EAP: the phase mask of the SLM is optimized with respect to the true key and a randomly chosen output mode, and in each session of the verification stage the CRP and the LO phase are chosen at random and independently by the verifier, and they are never revealed.
Collision resistance
Collision resistance refers to the protocol’s capability of distinguishing between two randomly chosen keys, and its importance is twofold^{1,2,4,5}. First, it implies that the EAP can distinguish between different honest users who are holders of random and independently prepared keys. Second, it is not possible to cheat on a collisionresistant EAP by using a randomly chosen false key.
To gain some insight into the operation of the EAP, let us focus first on a single session, with the typical situation for the response of the true key and a false key summarized in Fig. 3. The main observation is that, with high probability, the response of a false key lies close to the origin (0, 0) of the phase representation shown in Fig. 3(a), inside or very close to a circular area of radius [see dashed circle in Fig. 3(a)], whereas the response of the true key lies well outside this area [see star in Fig. 3(a)], with its precise location determined by the enhancement and the probe state. This behaviour can be explained easily, if we note that the phase mask of the SLM is not optimized with respect to the false key, and Eq. (12) implies that the quadratures of the scattered field will satisfy and , with high probability. By contrast, when the true key is interrogated, the SLM is optimized, and from Eq. (13) we have that either or , with . For the parameters used in Fig. 3(a), we have ρ_{f} = 10, , and , which correspond to the depicted behaviour.
These observations hold for any session, where in each session the verifier chooses at random the quadrature to be measured, and checks whether the outcome falls within a bin that is centred at or , for θ = 0 and π/2 respectively. Given that both quadratures and are treated equally, after sessions the verifier has obtained samples from both distributions. As discussed earlier, for the true key the centres of the sampled distributions coincide with the centres of the bins and, irrespective of the measured quadrature, the theoretical probability for the outcome to fall in the bin is P_{in} [see Fig. 3(b)]. By contrast, in the case of a false key, the samples are obtained from Gaussian distributions of the form of Eq. (10), centred at and , and we have either or . Hence, recalling that , and for sufficiently large values of , we expect negligible overlap between one of the sampled distributions and the corresponding bin [see Fig. 3(b)], thereby resulting in a significant deviation of the empirical probability p_{in} from the theoretical probability P_{in}.
In practice, we would like to have as large deviations as possible so that the detection of a false key is guaranteed. To this end, it is sufficient to impose the condition . This is because, according to the Gaussian distribution of Eq. (10), outcomes q with occur with probabilities that are at least two orders of magnitude smaller than the maximum probability corresponding to the outcome . Assuming 0.5 ≤ η ≤ 1, the worst case scenario is for σ = 1, and using the above expressions for ρ_{t} and ρ_{f} one readily obtains or else
Condition (17) ensures the detection of a false key, because it implies that for at least one of the quadratures, the corresponding distribution has negligible overlap with the bin used by the verifier, and hence that it will have negligible contribution to the estimation of p_{in}. Typically, the number of modes and the enhancement depend strongly on the details of the wavefrontshaping setup, whereas the fraction l/L depends only on the key. For a fixed wavefrontshaping setup, and assuming that the keys used in the EAP are characterized by the same ratio l/L, one can easily adjust the mean number of photons per incoming mode, μ_{c}/N, so that the above condition is satisfied. As shown in Fig. 4, condition (17) is satisfied in many existing wavefrontshaping setups, for a broad range of mean photon number per mode values.
To confirm the above observations, we have performed simulations of the EAP for various combinations of parameters. More details about our simulations can be found in the Methods section, and in Fig. 5 we present an example of our results. Clearly, with high probability the false key results in an estimate p_{in}, which is about an order of magnitude smaller than the expected probability P_{in}, and thus it will be detected by a verification test with any error ε < 1. At the same time the true key results in an estimate that satisfies , and thus it will pass the verification test. Condition (17) is readily satisfied for the parameters used in Fig. 5 (we have and ), leading to the depicted difference between P_{in} and p_{in} in the case of a false key.
Sensitivity to cloning
Although perfect cloning of PUKs is considered to be practically impossible, imperfect cloning cannot be excluded^{4,5,11}. The question therefore is whether our EAP is capable of distinguishing between the true key and a clone of it. To address this question, we modelled a D–close clone by a scattering matrix, which differs from the scattering matrix of the true key in a fraction of elements D ≤ 1. Hence, the quality of the clone increases with a decreasing D, with D = 0 and D = 1 corresponding to a perfect and a totally randomized clone, respectively. A D–close clone is expected to pass the verification test if its response to the M random challenges is such that, with high probability, the estimated probability p_{in} satisfies . But, how good a clone should be in order for this to happen?
The typical response of D–close clones relative to the response of the true key is shown in Fig. 6. We see that for values of , the response of D–close clones lies very close to the response of the true key. In this case, one may expect high probability for a clone to result in a probability p_{in} very close to P_{in}. As D increases, however, the responses of the clones move rapidly away from the response of the true key, and p_{in} is also expected to move away from P_{in}. This behaviour is clearly shown in the probability distributions of Fig. 7(a). As a result, the probability for a D–close clone to pass the verification test, i.e., to result in an estimate p_{in} such that , decreases rapidly with increasing D [see Fig. 7(b)]. Note that for fixed D and , this probability is expected to decrease with decreasing error ε, because the accuracy in the estimation of P_{in} increases in this case. Figure 7(b) suggests that for and ε ≤ 5 × 10^{−2}, the scattering matrix of a clone should differ from the one of the key in a small fraction of elements (smaller than 3% or so), in order for the clone to have a nonnegligible probability to pass the verification test. Cloning of such a high quality is a formidable challenge for today’s technology, because it requires the exact positioning (on a nanometer scale) of millions of scatterers with the exact characteristics^{4,11}. It is also worth noting here that according to the results of Figs 6 and 7(b), the robustness of the EAP against cloning appears to increase considerably with an increasing number of modes. This finding suggests that if the protocol is realized using existing wavefront shaping setups, which have been shown capable of controlling thousands of modes, then the probability for a clone with to pass the verification test will be at most 10^{−3}.
We remark that we have performed simulations for many different combinations of parameters, but for practical reasons we have presented results for certain representative combinations only. The main findings and conclusions presented here hold for all of the combinations we have studied, and we expect that they are generally valid.
Discussion
In the present form of the EAP, the number of sessions that can be performed within a prescribed period of time, is mainly limited by the separation distances of the various components of the setup, and the HD bandwidth. Assuming that the different components of the setup (laser source, interrogation chamber and HD setup) are located in neighbouring rooms, the typical total distances to be travelled by the probe and the scattered light are of the order of tens of meters. HD bandwidth is typically ~10–100 MHz depending on the specific implementation. Hence, the time of a single session, i.e., the time that it takes for a pulse to propagate from the laser source to the key, and from there to the HD setup where it will be analysed, is estimated to be less than a microsecond. According to Eq. (16), verification tests of error and confidence 99.9% require sessions, and the total verification time is expected to be a few seconds.
Our EAP is the first one to rely on conjugate quantum continuous variables, and provides a practical way to secure authentication of optical PUKs without the need for photon counting. Assuming a tamperresistant verification setup, we have shown that the protocol offers collision resistance and robustness against cloning. Moreover, it is worth emphasizing that, as long as the verification setup is tamper resistant, a compromised database does not affect the security of the protocol. Indeed, even if an adversary has access to the list of CRPs to be used for the authentication of a key, the sequence of probe states as well as the sequence of the quadratures to be measured in M sessions, are not a priori known. They are chosen at random during the verification, and the probability for an adversary to guess correctly both sequences is , for , .
Collision resistance and robustness against cloning are necessary for our EAP to be useful in practice^{1,2,4,5}. Its security against cheating strategies, where an adversary has access to the verification setup, goes beyond the scope of the present work, and requires an indepth description and analysis of the strategy under consideration. We do point out, however, that a prerequisite for the successful implementation of such attacks is that the adversary has access to the challenge states (or equivalently to the interrogation chamber), as well as to the LO, without being noticed by the verifier. The proposed fiberbased implementation of our scheme allows for the spatial separation of the interrogation chamber from the laser source and the HD setup (e.g., they may be located in nearby rooms). The LO never enters the interrogation chamber, and an adversary who has access to this chamber only does not have access to the reference frame used for the definition of the quantum state of the probes. Finally, it is worth emphasizing that the only constraints on the mean number of photons of the probe are the ones imposed by Eq. (17). This is because we have assumed that the verification setup is tamperresistant. The security of the protocol against attackers who have access to the verification setup may require additional constraints on the mean number of photons in the probes, as well as on the size of the set of states . Such security analysis depends strongly on the details of the attack under consideration, but it will rely on the fact that the quadrature components of the electric field do not commute, and thus by virtue of Heisenberg’s uncertainty relation, they cannot be determined simultaneously with arbitrary accuracy.
Methods
The Gaussianstatistics model
The model (3) assumes that we are in the diffusive regime, and the key consists of a large number of independent totally unrelated elementary scattering areas^{26,33}. The electric field of the scattered light at a particular observation point consists of a multitude of dephased contributions from different scattering areas, and thus its amplitude can be expressed as a sum of many elementary phasor contributions. As a result of the occurrence of multiple scattering events, the amplitude of each phasor bears no relation to its phase, while the latter is uniformly distributed over [−π, π]. Under these conditions, the centrallimit theorem implies that the scattering problem can be described in the framework of a scattering matrix with independent identically distributed random entries of Gaussian statistics. These conditions have been shown to be satisfied in many experimental setups^{26,27,28,29}, and the Gaussianstatistics model yielded results that were in excellent agreement with experimental observations.
Sample size in the enrolment stage
The two quadratures of are the centres of Gaussian distributions of standard deviation σ. We assume that the quadratures are estimated by sampling at random and independently from the corresponding Gaussian distributions. Consider one of the quadratures, say . It will be approximated by the sample mean, which is also a random variable and according to the centrallimit theorem, it follows a Gaussian distribution centred at and with standard deviation , where M_{e} is the sample size. Hence, the probability to obtain estimates outside the interval is at most 10^{−6}. In other words, it is highly unlikely for the error in the estimation of the quadrature to exceed , where we have assumed that σ ≤ 1. As mentioned in the main text, the sample size M_{e} has to be such that , where ε is the error in the verification test. These arguments hold for the estimation of either of the two quadratures for a given probe state, and assuming that both quadratures and all of the probe states are treated equally, the total sample size is (for a standard HD setup). Even for moderate values of N > 2, the total sample size is expected to be considerably larger than the sample sizes typically used in the verification stage. Assuming identical enrolment and verification setups, we can use the parameters of the Discussion above, in order to obtain an estimate for the duration of an enrolment stage with N = 10, and . The total sample size is , while the typical sample time is expected to be less than a microsecond. Hence, the enrolment stage will last less than 14 hours, which is not in any case prohibitive, given that the enrolment is performed only once by the manufacturer, well before a key is given to a user.
Sample size in the verification stage
In our EAP, the verification relies on the estimation of the probability P_{in}, which refers to the probability for an outcome that is drawn at random from the Gaussian distribution (10), to fall within an interval (bin) of size δ. To estimate the sample size (i.e., the number of sessions) required for the reliable estimation of P_{in}, we can introduce a binary random variable for the ith session, say ω_{i}, which refers to whether the outcome of the measurement in the ith session falls or not within the specified bin. In particular, let ω_{i} be 1 when the outcome lies inside the interval, and 0 otherwise. The former occurs with probability P_{in}, and the latter with probability . Recall that all of the sessions in the verification are identical, and independent of each other. For M sessions, we can introduce the random variable , and let be an estimate of P_{in} based on the outcomes in M sessions. Our task is to estimate how large M must be in order for the estimate to satisfy , where is the uncertainty, and the absolute error. To this end, it is sufficient to ask for
where . From the Chernoff’s bound^{36,37} for the relative error we have
where we have used the inequality for 0 < P_{in} < 1. To enforce condition (18), we ask for the upper bound in the last expression to be less than ζ. Subsequently, solving for M one readily obtains that the sample size has to be larger than M_{th}, where M_{th} is given by Eq. (16).
Simulations
We performed simulations for various combinations of parameters, and for each set of parameters we worked as follows. We generated reflection coefficients of the true key, using a generator of complex Gaussian random variables with the characteristics of Eq. (3). Subsequently, we found the optimal phase mask of the SLM that maximizes the number of scattered photons in a prescribed target mode, using known algorithms^{17}. The false keys and the clones were generated along the same lines. Each false key pertained to a set of random and independently chosen reflection coefficients, whereas for a D–close clone we substituted of the reflection coefficients of the true key by fresh random and independently chosen coefficients. The elements that were substituted were also chosen at random and independently.
Each key (true, false or clone) was interrogated by M probes, with the state of each probe chosen at random and independently from a uniform distribution over a finite set of prescribed coherent states. In each session, i.e., for each probe state, was obtained from Eq. (8), using the reflection coefficients for the true key, the false key, or the clone, while the phase mask for the SLM was always set to the optimal configuration that maximizes the light that is scattered from the true key to the target mode s. Having estimated , we chose θ at random from a uniform distribution over {0, π/2}. In accordance with the theory of HD, the outcome of a measurement of the quadrature was simulated by a real random variable, which was chosen from a Gaussian distribution centred at and with standard deviation . At the end of the session we checked whether the outcome falls within the bin or not.
By performing this procedure for a large number of random and independently chosen false keys, and clones, we obtained sufficiently large samples to estimate the probabilities shown in the figures. It is worth emphasizing that different random generators were employed in our simulations, so that to ensure independence of the drawn random numbers. Finally, we note that for practical and numerical reasons, the number of sessions in our simulations could not exceed 10^{3}. Our results, however, show that this number was sufficient for the verification stage to identify successfully the true key and to detect the false keys and the clones, which suggests that M_{th} is not a tight lower bound on the required number of sessions.
Additional Information
How to cite this article: Nikolopoulos, G. M. and Diamanti, E. Continuousvariable quantum authentication of physical unclonable keys. Sci. Rep. 7, 46047; doi: 10.1038/srep46047 (2017).
Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
Menezes, A., van Oorschot, P. & Vanstone, S. Handbook of Applied Cryptography(CRC Press, Boca Raton, 1996).
Martin, K. M. Everyday Cryptography: Fundamental Principles and Applications(Oxford University Press, New York, 2012).
Horstmeyer, R., Assawaworrarit, S., Rührmair, U. & Yang, C. Physically secure and fully reconfigurable data storage using optical scattering. IEEE International Symposium on Hardware Oriented Security and Trust(2015).
Pappu, R., Recht, B., Taylor, J. & Gershenfeld, N. Physical oneway functions. Science 297, 2026 (2002).
Pappu, R. Physical OneWay Functions, Ph.D. dissertation, Massachusetts Institute of Technology (2001).
Buchanan, J. D. R., Cowburn, R. P., Jausovec, A., Petit, D., Seem, P., Xiong, G., Atkinson, D., Fenton, K., Allwood, D. A. & Bryan, M. T. Forgery: ‘Fingerprinting’ documents and packaging. Nature 436, 475 (2005).
Tuyls, P., Škorić, B., Stallinga, S., Akkermans, A. H. M. & Ophey, W. Informationtheoretic security analysis of physical uncloneable Functions. Financial Crypto and Data Security 3, 141 (2005).
Škorić, B. On the entropy of keys derived from laser speckle; statistical properties of Gabortransformed speckle. J. Opt. A 10 055304 (2008).
Škorić, B., Mosk, A. P. & Pinkse, P. W. H. Security of quantumreadout PUFs against quadraturebased challengeestimation attacks. Int. J. Quant. Inf. 11, 1350041 (2013).
Horstmayer, R., Judkewitz, B., Vellekoop, I. M., Assawaworrarit, S. & Yang, C. Physical keyprotected onetime pad. Sci. Rep. 3, 3543 (2013).
Goorden, S. A., Horstmann, M., Mosk, A. P., Škorić, B. & Pinkse, P. W. H. Quantumsecure authentication of a physical unclonable key. Optica 1, 421 (2014).
Zhang, H. & Tzortzakis, S. Robust authentication through stochastic femtosecond laser filament induced scattering surfaces. Appl. Phys. Lett. 108, 211107 (2016).
Zhang, H., Di Battista, D., Zacharakis, G. & Tzortzakis, S. Erratum: Robust authentication through stochastic femtosecond laser filament induced scattering surfaces. Appl. Phys. Lett. 109, 039901 (2016).
Nielsen, M. A. & Chuang, I. L. Quantum Computation and Quantum Information(Cambridge University Press, Cambridge, London, 2000).
Jouguet, P., KunzJacques, S., Leverrier, A., Grangier, P. & Diamanti, E. Experimental demonstration of longdistance continuousvariable quantum key distribution. Nature Photon. 7, 378 (2013).
Vellekoop, I. M. & Mosk, A. P. Focusing coherent light through opaque strongly scattering media. Opt. Lett. 32, 2309 (2007).
Vellekoop, I. M. & Mosk, A. P. Phase control algorithms for focusing light through turbid media. Opt. Comm. 281 3071 (2008).
Mosk, A. P., Lagendijk, A., Lerosey, G. & Fink, M. Controlling waves in space and time for imaging and focusing in complex media. Nature Photonics 6, 283 (2012).
Huisman, S. R., Huisman, T. J., Goorden, S. A., Mosk, A. P. & Pinkse, P. W. H. Programming balanced optical beam splitters in white paint. Optics Express 22, 8320 (2014).
Huisman, S. R., Huisman, T. J., Goorden, S. A., Mosk, A. P. & Pinkse, P. W. H. Programmable multiport optical circuits in opaque scattering materials. Opt. Express 23, 3102 (2015).
Poppoff, S. K., Lerosey, G., Carminati, R., Fink, M., Boccara, A. C. & Gigan, S. Measuring the Transmission Matrix in Optics: An Approach to the Study and Control of Light Propagation in Disordered Media. Phys. Rev. Lett. 104, 100601 (2010).
Poppoff, S. K., Lerosey, G., Fink, M., Boccara, A. C. & Gigan, S. Controlling light through optical disordered media: transmission matrix approach. New J. Phys. 13, 123021 (2011).
Defienne, H., Barbieri, M., Chalopin, B., Chatel, B., Walmsley, I. A., Smith, B. J. & Gigan, S. Nonclassical light manipulation in a multiplescattering medium. Opt. Lett. 39, (2014).
Huisman, T. J., Huisman, S. R., Mosk, A. P. & Pinkse, P. W. H. Controlling singlephoton Fockstate propagation through opaque scattering media. Appl. Phys. B 116, 603 (2014).
Wolterink, T. A. W., Uppu, R., Ctistis, G., Vos, W. L., Boller, K. J. & Pinkse, P. W. H. Programmable twophoton quantum interference in 10^{3} channels in opaque scattering media. Phys. Rev. A 93, 053817 (2016).
Goodman, J. W. Statistical Optics(John Wiley & Sons, New York, 1985).
Mello, P. A. & Kumar, N. Quantum Transport in mesoscopic system: complexity and statistical fluctuations, Oxford University Press, New York, 2004).
Lodahl, P., Mosk, A. P. & Lagendijk, A. Spatial quantum correlations in multiple scattered light. Phys. Rev. Lett. 95, 173901 (2005).
Lodahl, P. Quantum correlations induced by multiple scattering of quadrature squeezed light. Optics Express 14, 6919 (2006).
Walls, D. F. & Millburn, G. J. Quantum Optics(Springer Verlag, Berlin, 2008).
Yariv, A. Universal relations for coupling of optical power between microresonators and dielectric waveguides. Electronics Lett. 36, 321 (2000).
Yilmaz, H., Vos, W. L. & Mosk, A. P. Optimal control of light propagation through multiplescattering media in the presence of noise. Biomed. Opt. Express 4, 1759 (2013).
Anderson, B. R., Gunawidjaja, R. & Eilers, H. Effect of experimental parameters on optimal transmission of light through opaque media. Phys. Rev. A 90, 053826 (2014).
Raymer, M. G., Cooper, J., Carmichael, H. J., Beck, M. & Smithey, D. T. Ultrafast measurement of opticalfield statistics by dcbalanced homodyne detection. J. Opt. Soc. Am. B 12, 1801 (1995).
Nikolopoulos, G. M. & Brougham, T. Decision and function problems based on boson sampling. Phys. Rev. A 94, 012315 (2016).
Mitzenmacher, M. & Upfal, E. Probability and Computing: Randomized Algorithms and Probabilistic Analysis(Cambridge University Press, New York, 2005).
Alon, N. & Spencer, J. H. The Probabilistic Method(John Wiley & Sons, New Jersey, 2008).
Acknowledgements
This article is based on work performed in the context of the Nanoscale Quantum Optics COST Action (MP1403), supported by the European Cooperation in Science and Technology. We acknowledge financial support from the French National Research Agency project QRYPTOS.
Author information
Authors and Affiliations
Contributions
G.M.N. conceived the main idea, developed the theory and performed the simulations. E.D. contributed to the analysis of the results, as well as to practical aspects pertaining to the implementation of the protocol.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing financial interests.
Rights and permissions
This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
About this article
Cite this article
Nikolopoulos, G., Diamanti, E. Continuousvariable quantum authentication of physical unclonable keys. Sci Rep 7, 46047 (2017). https://doi.org/10.1038/srep46047
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/srep46047
This article is cited by

A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?
Quantum Information Processing (2022)

Cryptographic oneway function based on boson sampling
Quantum Information Processing (2019)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.