A system that can compare physical objects while potentially protecting sensitive information about the objects themselves has been demonstrated experimentally at the U.S. Department of Energy’s (DOE) Princeton Plasma Physics Laboratory (PPPL). This work, by researchers at Princeton University and PPPL, marks an initial confirmation of the application of a powerful cryptographic technique in the physical world.
“This is the first experimental demonstration of a physical zero-knowledge proof,” said Sébastien Philippe, a graduate student in the Department of Mechanical and Aerospace Engineering at Princeton University and lead author of the paper. “We have translated a major method of modern cryptography devised originally for computational tasks into use for a physical system.” Cryptography is the science of disguising information.
This research, supported by funding from the DOE’s National Nuclear Security Administration through the Consortium for Verification Technology, marks a promising first experimental step toward a technique that could prove useful in future disarmament agreements, pending the results of further development, testing and evaluation. While important questions remain, the technique, first proposed in a paper published in 2014 in Nature magazine, might have potential application to verify that nuclear warheads presented for disarmament were in fact true warheads. Support for this work came also from the John D. and Catherine T. MacArthur Foundation and the Carnegie Foundation of New York.
The research, outlined in a paper in Nature Communications on September 20, 2016, was conducted on a set of 2-inch steel and aluminum cubes arranged in different combinations. Researchers first organized the cubes into a designated “true” pattern and then into a number of “false” ones. Next, they beamed high-energy neutrons into each arrangement and recorded how many passed through to bubble neutron detectors produced by Yale University, on the other side. When a neutron interacts with a superheated droplet in the detector, it creates a stable macroscopic bubble.
To avoid revealing information about the composition and configuration of the cubes, bubbles created in this manner were added to those already preloaded into the detectors. The preload was designed so that if a valid object were presented, the sum of the preload and the signal detected with the object present would equal the count produced by firing neutrons directly into the detectors – with no object in front of them.
The experiment found that the count for the “true” pattern equaled the sum of the preload and the object when neutrons were beamed with nothing in front of them, while the count for the significantly different “false” arrangements clearly did not.
“This was an extremely important experimental demonstration,” said Robert Goldston, a fusion scientist and coauthor of the paper who is former director of PPPL and a Princeton professor of astrophysical sciences. “We had a theoretical idea and have now provided a proven practical example.” Joining him as coauthors are Alex Glaser, associate professor in Princeton’s Woodrow Wilson School of Public and International Affairs and the Department of Mechanical and Aerospace Engineering; and Francesco d’Errico, senior research scientist at the Yale School of Medicine and professor at the University of Pisa, Italy.
When further developed for a possible arms control application, the technique would add bubbles from irradiation of a putative warhead to those already preloaded into detectors by the warhead’s owner.
If the total for the new and preloaded bubbles equaled the count produced by beaming neutrons into the detectors with nothing in front of them, the putative weapon would be verified to be a true one. But if the total count for the preload plus warhead irradiation did not match the no-object count, the inspected weapon would be exposed as a spoof. Prior to the test, the inspector would randomly select which preloaded detectors to use with which putative warhead, and which preload to use with a warhead that was, for example, selected from the owner’s active inventory.
In a sensitive measurement, such as one involving a real nuclear warhead, the proposition is that no classified data would be exposed or shared in the process, and no electronic components that might be vulnerable to tampering or snooping would be used. Even statistical noise — or random variation in neutron measurement — would convey no data. Indeed, “For the zero-knowledge property to be conserved, neither the signal nor the noise may carry information,” the authors write. A necessary future step is to assess this proposition fully, and to develop and review a concept of operations in detail to determine actual viability and information sensitivity.
Important questions yet to be resolved include the details of obtaining and confirming a target warhead during the zero-knowledge measurement; specifics of establishing and maintaining the pre-loaded detectors in a way that ensures inspecting party confidence without revealing any data considered sensitive by the inspected party; and feasibility questions associated with safely deploying active interrogation measurement techniques on actual nuclear warheads in sensitive physical environments, in a way that provides confidence to both the inspected and inspecting parties.
Glaser, Goldston and Boaz Barak, a professor of computer science at Harvard University and former Princeton associate professor, first launched the concept for a zero-knowledge protocol for warhead verification in the 2014 paper in Nature magazine. That paper led Foreign Policy magazine to name the authors among its “100 Leading Global Thinkers of 2014,” and prompted other research centers to embark on similar projects. “We are happy to see this important field of research gain new momentum and create new opportunities for collaboration between national laboratories and universities,” Glaser said.
The Latest on: Physical zero-knowledge proof
via Google News
The Latest on: Physical zero-knowledge proof
- IT Disaster Recovery & Cyber Security: Joining Forces for Resiliencyon February 18, 2021 at 6:32 pm
These tools look at your physical infrastructure, networks ... be quickly recoverable to meet the needs of the organization, they must also be bullet proof. I believe this is yet another driver of ...
- The 'Ostrich Approach' Won't Work with Mobile Malwareon February 18, 2021 at 6:32 pm
We can easily see yet another proof point of this with mobile malware ... the bad guys can’t access sensitive information even with unlimited time and fully physical control of the device. And of ...
- Disabling Tap To Pay Debit Cardson February 15, 2021 at 3:59 pm
Some people aren’t too crazy about the rush of RFID enabled credit & debit cards, and the problem is, you don’t really have a choice what card you get if the bank sends you a new one!
- A More Correct Horse Battery Stapleon February 14, 2021 at 4:00 pm
Passwords are terrible. The usual requirements of a number, capital letter, or punctuation mark force users to create unmemorable passwords, leading to post-it notes ...
- Shafi Goldwasser wins L'Oréal-UNESCO Awardon February 12, 2021 at 11:31 am
Goldwasser is also known of her pioneering work on interactive and probabilistic proof verification ... “Shafi's work on zero-knowledge proofs in the 1980s enabled cryptographic protocols, which are ...
- ChainLink: Adoption Will Drive LINK's Price Higher In The Long Runon January 27, 2021 at 1:58 pm
ChainLink oracles cryptographically sign each piece of data delivered to the blockchain, serving as irrefutable proof that the ... and DECO (zero knowledge proofs regarding TLS web sessions).
- DDoS-Guard To Forfeit Internet Space Occupied by Parleron January 21, 2021 at 1:45 pm
Suspecting that DDoS-Guard incorporated in Belize on paper just to get huge swaths of IP addresses that are supposed to be given only to entities with a physical presence in the region ...
- Privacy in CBDC technologyon August 3, 2020 at 11:07 pm
Typical proof systems are made up of provers (e.g., end-users ... 2020) is also a public DLT but with fully private transactions built on zero-knowledge proofs. These privacy constructs are highly ...
- Security and Privacyon July 28, 2020 at 11:18 pm
As more of our world gets connected online, we face growing risk of malicious attacks that can steal our data and our money, spy on us through our devices, undermine our infrastructure, and even take ...
via Bing News