1. Introduction
Die-rolling is the two-party cryptographic primitive in which two spatially separated parties, Alice and Bob, wish to agree upon an integer , generated uniformly at random, over a communication channel. When designing die-rolling protocols, the security goals are:
Completeness: If both parties are honest, then their outcomes are the same, uniformly random, and neither party aborts.
Soundness against cheating Bob: If Alice is honest, then a dishonest (i.e., cheating) Bob cannot influence her protocol outcome away from uniform.
Soundness against cheating Alice: If Bob is honest, then a dishonest (i.e., cheating) Alice cannot influence his protocol outcome away from uniform.
We note here that Alice and Bob start uncorrelated and unentangled. Otherwise, Alice and Bob could each start with half of the following maximally entangled state
and measure in the computational basis to obtain a perfectly correlated, uniformly random die-roll. Thus, such a primitive would be trivial if they were allowed to start entangled.
Die-rolling is a generalization of a well-studied primitive known as coin-flipping [
1], which is the special case of die-rolling when
. In this paper, we analyze die-rolling protocols in a similar fashion that is widely adopted for coin-flipping protocols [
2,
3,
4,
5,
6,
7,
8]. That is, we assume perfect completeness and calculate the soundness in terms of the cheating probabilities, as defined by the symbols:
: | The probability with which cheating Bob’s attempt to force honest Alice to accept the outcome happens to succeed. |
: | The probability with which cheating Alice’s attempt to force honest Bob to accept the outcome happens to succeed. |
We are concerned with designing protocols that minimize the maximum of these 2D quantities since a protocol is only as good as its worst cheating probability. Coincidentally, all of the protocols we consider in this paper have the property that all of Alice’s cheating probabilities are equal and similar for a cheating Bob. Therefore, for brevity, we introduce the following shorthand notation:
When
, the security definition for die-rolling above aligns with that of strong coin-flipping. For strong coin-flipping, it was shown by Kitaev [
9] that any quantum protocol satisfies
and
, implying that at least one party can cheat with probability at least
. It was later shown by Chailloux and Kerenidis [
6] that all four cheating probabilities can be made arbitrarily close to
by using optimal quantum protocols for weak coin-flipping as discovered by Mochon [
5].
As pointed out in [
10], Kitaev’s proof for the lower bound on coin-flipping extends naturally to die-rolling; it can be shown that, for any quantum die-rolling protocol, we have
for any
. This implies the lower bound
In fact, extending the optimal coin-flipping protocol construction in [
6], it was shown by Aharon and Silman [
10] that for
, it is possible to find quantum protocols where the maximum of the 2D probabilities is at most
, for any
.
The optimal protocols in [
6,
10] are not explicit as they rely on using Mochon’s optimal weak coin-flipping protocols as subroutines. Moreover, Mochon’s protocols are very complicated and not given explicitly, although they have been simplified [
11].
The best known explicit quantum protocol for die-rolling, of which we are aware is given in [
10]. It uses three messages and has cheating probabilities
These probabilities have the attractive property of approximating Kitaev’s lower bound in the limit, but since
as
, the maximum cheating probability is quite large. (The protocols considered in this paper have a much different form than these protocols.)
This motivates the work in this paper, which is to find simple and explicit protocols for die-rolling that approximate Kitaev’s lower bound (
4).
1.1. Simple Classical Protocols
We first show that simple classical protocols exist with decent security.
Protocol 1 (Classical protocol).
Alice and Bob agree on a parameter . (In other words, the value m is fixed and known to both Alice and Bob.)
Bob chooses a subset with , uniformly at random, and sends S to Alice. If , Alice aborts.
Alice selects uniformly at random and tells Bob her selection. If , Bob aborts.
Both parties output d.
We see that this is a valid die-rolling protocol as each party outputs the same value
and each value occurs with equal probability. As for the cheating probabilities, it is straightforward to see that
Besides being extremely simple, this protocol has the following interesting properties:
The product , for any , saturates Kitaev’s lower bound for every .
For D square and , we have , yielding an optimal protocol!
If D is not square, then one party has a cheating advantage, i.e., .
Note that to minimize , it does not make sense to choose m greater than or less than (where we use the notation to denote the greatest integer y satisfying and the notation to denote the least integer y satisfying ). We can see that for , , or , for example, choosing the ceiling is better, while, for or , choosing the floor is better. Thus, we keep both the cases and summarize the overall security of the above protocol in the following lemma.
Lemma 1. For , there exists a classical die-rolling protocol satisfyingwhich is optimal when D is square.
Note that the special case of
has either Alice or Bob able to cheat perfectly, which is the case for all classical coin-flipping protocols. However, Kitaev’s bound on the product of cheating probabilities is still (trivially) satisfied. For
, we can choose
to obtain
proving that even classical protocols can have nontrivial security, which is vastly different than the
case. The values of
from Label (
7) for
are later presented in
Table 1.
We are not aware of other lower bounds for classical die-rolling protocols apart from those implied by Kitaev’s bounds above. We see that sometimes classical protocols can be optimal, for example when D is square. We now consider how to design (simple) quantum protocols and see what levels of security they can offer.
1.2. Simple Quantum Protocols
Many of the best known explicit protocols for strong coin-flipping are based on the idea of bit-commitment [
4,
8,
12,
13]. Optimal protocols are known for bit-commitment as well [
14], but are again based on weak coin-flipping and are thus very complicated.
In this paper, we generalize the above simple, explicit protocols such that Alice commits to an integer instead of a bit. More precisely, our quantum protocols have the following form.
Protocol 2 (Quantum protocol). A quantum die-rolling protocol based on the idea of integer-commitment, denoted here as , is defined as follows:
Alice and Bob agree on a set of states . (In other words, the states are fixed and known to both Alice and Bob.)
Alice chooses a random and creates the state and sends the subsystem to Bob.
Bob sends a uniformly random to Alice.
Alice reveals a to Bob and sends him the subsystem .
Bob checks if is in state using the measurement . Bob accepts/rejects a based on his measurement outcome.
If Bob does not abort, Alice and Bob output .
The special case of yields the structure of the simple, explicit coin-flipping protocols mentioned above. Indeed, these protocols are very easy to describe. One needs only the knowledge of the D states and, implicitly, the systems they act on, and .
We start by formulating the cheating probabilities of a -protocol using semidefinite programming. Once we have established the semidefinite programming cheating strategy formulations, we are able to analyze the security of -protocols. Furthermore, we are able to analyze modifications to such protocols and the corresponding changes in security.
In this paper, we present a -protocol with near-optimal security. We develop this protocol in several steps described below.
The first step is to start with a protocol with decent security. To do this, we show how to create a -protocol with the same cheating probabilities as in Protocol 1.
Proposition 1. There exists a -protocol with the same cheating probabilities as in Protocol 1, namelyrecalling that is a parameter fixed by the protocol.
The second step is to give a process that (approximately) balances the maximum cheating probabilities of Alice and Bob. We accomplish this by modifying the protocol in order to decrease the overall maximum cheating probability (while possibly increasing lesser cheating probabilities).
Proposition 2. If there exists a -protocol with cheating probabilities and , then there exists a -protocol with maximum cheating probabilityMoreover, the last inequality is strict when yielding a strictly better protocol.
By combining the above two propositions, we are able to obtain the main result of this paper.
Theorem 1. For any , there exists a (quantum) -protocol satisfyingwhich is strictly better than Protocol 1 when D is not square.
Since for large D, this bound is very close to optimal. To compare numbers, we list the values for , below.
Related literature. Quantum protocols for a closely related cryptographic task known as string-commitment have been considered [
15,
16,
17,
18,
19]. Technically, this is the case of integer-commitment when
(if the string has
n bits). It is worth noting that the quantum protocols considered in this paper are quite similar, but the security definitions are very different. Roughly speaking, the references above are concerned with quantum protocols where Alice is able to “cheat” on
a bits and Bob is able to “learn”
b bits of information about the
n bit string. Multiple protocols and security trade-offs are given in the above references.
The use of semidefinite programming has been very valuable in the study of quantum cryptographic protocols (see, for example, [
5,
7,
8,
9,
20,
21]). Roughly speaking, if one is able to formulate cheating probabilities as semidefinite programs, then the problem of analyzing cryptographic security can be translated into a concrete mathematical problem. Moreover, one then has the entire theory of semidefinite programming at their disposal. This is the approach taken in this work, in order to shine new light on a cryptographic task using the lens of semidefinite programming.
Moreover, the techniques developed in this paper may find new applications in the study of other cryptographic primitives. For a simple example, if one changes the definition of the die-rolling primitive such that non-uniform honest outcome probabilities are allowed, then our approach can easily handle this modification. Future research involves studying how these techniques can be applied to other security definitions as well, such as bounding the total variation distance between a “dishonest” outcome distribution and the ”honest” uniform distribution.
1.3. Kitaev’s Lower Bound and the Quantum State Discrimination Problem
The security analysis of
-protocols has many similarities to the quantum state discrimination problem. Suppose you are given a quantum state
with respective probabilities
. The quantum state discrimination problem is to determine which state you have been given (by means of measuring it) with the maximum probability of being correct. We only briefly discuss this problem in this work; the interested reader is referred to the survey [
22] and the references therein.
We give a very short proof of Kitaev’s lower bound for the special case of -protocols. Afterwards, we show that it can be generalized to show the following bound for the quantum state discrimination problem.
Proposition 3. If given a state from the set , with respective probabilities , then there exists a measurement to learn which state was given with success probability at least for any positive definite Hermitian satisfying , for all . Here, denotes the smallest eigenvalue of a Hermitian matrix.
Note that the above proposition is indeed independent of the s and could thus probably be strengthened. However, we use cryptographic reasoning to argue that this bound can be tight.
1.4. Paper Organization.
In
Section 2, we develop the semidefinite programming cheating strategy formulations for Alice and Bob. In
Section 3, we exhibit a
-protocol and then use the semidefinite programming formulations to prove Proposition 1, that the protocol has the same cheating probabilities as in Protocol 1.
Section 4 shows how to balance the probabilities in a
-protocol by showing how to reduce Bob’s cheating and then how to reduce Alice’s. Combining these yields a proof of Proposition 2. Lastly, in
Section 5, we give a short proof of Kitaev’s lower bound when applied to
-protocols and then generalize it to the quantum state discrimination problem to prove Proposition 3.
2. Semidefinite Programming Cheating Strategy Formulations
In this section, we use the theory of semidefinite programming to formulate Alice and Bob’s maximum cheating probabilities for a
-protocol. The formulations in this section are a generalization of those for bit-commitment (see [
8] and the references therein for details about this special case).
2.1. Semidefinite Programming
Semidefinite programming is the theory of optimizing a linear function over a positive semidefinite matrix variable subject to finitely many affine constraints. A semidefinite program (SDP) can be written in the following form without loss of generality:
where
is a linear transformation,
C and
B are Hermitian, and
means that
is (Hermitian) positive semidefinite. Note that we are using the Hilbert–Schmidt inner product
, where
is the conjugate-transpose of
A.
Associated with every SDP is a dual SDP:
where
is the adjoint of
.
We refer to the optimization problem (
11) as the primal or primal SDP and to the optimization problem (
12) as the dual or dual SDP. We say that the primal is feasible if there exists an
X satisfying the (primal) constraints
and we say the dual is feasible if there exists
satisfying the (dual) constraints
Furthermore, if we have X positive definite, then the primal is said to be strictly feasible and if we have S positive definite, then the dual is said to be strictly feasible.
Semidefinite programming has a rich and powerful duality theory. In particular, we use the following:
Weak duality: | If the primal and dual are both feasible, then . |
Strong duality: | If the primal and dual are both strictly feasible, then and both attain an optimal solution. |
For more information about semidefinite programming and its duality theory, the reader is referred to [
23].
2.2. Cheating Strategy Formulations
To study a fixed
-protocol, it is convenient to define the following reduced states
for all
. We show that they appear in both the case of cheating Alice and cheating Bob.
Cheating Bob. To see how Bob can cheat, notice that he only has one message that he sends to Alice. Thus, he must send
to force the outcome he wishes. For example, if he wishes to force the outcome
d, he would send
b such that
. Therefore, he must extract the value of
a from
to accomplish this. Suppose that he measures
with the measurement
where the outcome of the measurement corresponds to Bob’s guess for
a. If Alice chose
, he succeeds in cheating if his guess is correct, which happens with probability
Since the choice of Alice’s integer
a is uniformly random, we can calculate Bob’s optimal cheating probability as
noting that the variables being optimized over correspond to a POVM measurement. Note that the maximum is attained since the set of feasible
forms a compact set.
Now that Bob’s optimal cheating probability is stated in terms of an SDP, we can examine its dual as shown in the lemma below.
Lemma 2. For any -
protocol, we have Proof. One can check using the definitions (
11) and (
12) that the optimization problem (
19) is the dual of Label (
18). Defining
, for all
, yields a strictly feasible solution for the primal. In addition,
is a strictly feasible solution for the dual. Thus, by strong duality, both the primal and dual attain an optimal solution and their optimal values are the same. ☐
We refer to the optimization problem (
18) as Bob’s primal SDP and to the optimization problem (
19) as Bob’s dual SDP. The utility of having dual SDP formulations is that any feasible solution yields an upper bound on the maximum cheating probability. Proving upper bounds on cheating probabilities would otherwise be a very hard task.
Cheating Alice. If Alice wishes to force Bob to accept outcome , she must convince him that the state in is indeed , where a is such that . Note that this choice of a is determined after learning b from Bob, which occurs with uniform probability.
To quantify the extent to which Alice can cheat, we examine the states Bob has during the protocol. We know that Bob measures and accepts
a with the measurement operator
. Let
be Alice’s last message. Then, Bob’s state at the end of the protocol is given by a density operator
acting on
, which is accepted with probability
. Note that Alice’s first message
is in state
which is independent of
a (since Alice’s first message does not depend on
a when she cheats). Thus, the states under Bob’s control are subject to the constraints
(Note that
, for all
, is implied by the constraints above, and is thus omitted.) On the other hand, if Alice maintains a purification of the states above, then, using Uhlmann’s Theorem [
24], she can prepare any set of states satisfying conditions (
20).
Again, since the set of feasible is compact, the above SDP attains an optimal solution.
Similar to the case of cheating Bob, we can view the dual of Alice’s cheating SDP above as shown in the lemma below.
Lemma 3. For any -
protocol, we have Proof. It can be checked that Label (
22) is in fact the dual of Label (
21). By defining
and each
to be completely mixed states, we have that the primal is strictly feasible. By defining
and each
to be equal to
, we have that the dual is strictly feasible as well. The result now holds by applying strong duality. ☐
We refer to the optimization problem (
21) as Alice’s primal SDP and the optimization problem (
22) as Alice’s dual SDP.
Note that every solution feasible in Alice’s dual SDP has being positive semidefinite, for all . We can further assume that each is positive definite if we sacrifice the attainment of an optimal solution. This is because we can take an optimal solution and consider , which is also feasible for any , and approaches as decreases to 0.
Next, we use an analysis similar to one found in [
20,
25] to simplify the constraint
when
is positive definite. Since
is an automorphism of the set of positive semidefinite matrices for any fixed positive definite
Z, we have
Note that since the quantity on the right is positive semidefinite with rank at most 1, its largest eigenvalue is equal to its trace, which is equal to
Thus, we can rewrite Label (
23) as
Therefore, we have the following lemma.
Lemma 4. For any -
protocol, we have We also refer to the optimization problem (
26) as Alice’s dual SDP and we distinguish them by equation number.
3. Finding a Decent DRIC-Protocol
In this section, we exhibit a
-protocol that has the same cheating probabilities as Protocol 1:
To do this, define
to be the subsets of
of cardinality
m and note that
. Consider the following states
for
, where
. Notice that
We now use the cheating SDPs developed in the previous section to analyze the cheating probabilities of this protocol.
Cheating Bob. To prove that Bob can cheat with probability at least , suppose he measures his message from Alice in the computational basis. He then obtains a random subset such that . He then guesses which integer is a and responds with the appropriate choice for b to get his desired outcome. He succeeds if and only if his guess for a (from the m choices in S) is correct. This strategy succeeds with probability . Thus, .
To prove Bob cannot cheat with probability greater than
, notice that
satisfies
and thus is feasible in Bob’s dual Label (
19). Therefore,
, as desired.
Cheating Alice. Alice can cheat by creating the maximally entangled state
and sending
to Bob. After learning
b, she sends
a such that
is her desired outcome. She also sends
to Bob (without altering it in any way). Thus, her cheating probability is precisely the probability of her passing Bob’s cheat detection, which is
Therefore, this cheating strategy succeeds with probability , proving .
To prove this strategy is optimal, we use Alice’s dual SDP (
26). Define
where
is a small positive constant.
is invertible and we can write
We see that each
satisfies
, for all
. In addition,
thus
Thus,
satisfies
proving
, for all
. Therefore,
, as desired.