Qubit-based Unclonable Encryption with Key Recycling
- URL: http://arxiv.org/abs/2004.04084v2
- Date: Tue, 28 Apr 2020 09:27:00 GMT
- Title: Qubit-based Unclonable Encryption with Key Recycling
- Authors: Daan Leermakers and Boris Skoric
- Abstract summary: We re-visit Gottesman's Unclonable Encryption as introduced by Gottesman in 2003.
We introduce a qubit-based prepare-and-measure Unclonable Encryption scheme with re-usable keys.
We provide a security proof based on the diamond norm distance, taking noise into account.
- Score: 2.355458445741348
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We re-visit Unclonable Encryption as introduced by Gottesman in 2003. We look
at the combination of Unclonable Encryption and Key Recycling, while aiming for
low communication complexity and high rate. We introduce a qubit-based
prepare-and-measure Unclonable Encryption scheme with re-usable keys. Our
scheme consists of a single transmission by Alice and a single classical
feedback bit from Bob. The transmission from Alice to Bob consists entirely of
qubits. The rate, defined as the message length divided by the number of
qubits, is higher than what can be achieved using Gottesman's scheme. We
provide a security proof based on the diamond norm distance, taking noise into
account.
Related papers
- Relating Quantum Tamper-Evident Encryption to Other Cryptographic Notions [0.0]
A quantum tamper-evident encryption scheme is a non-interactive symmetric-key encryption scheme mapping classical messages to quantum ciphertexts.
This quantum cryptographic primitive was first introduced by Gottesman in 2003.
We further our understanding of tamper-evident encryption by formally relating it to other cryptographic primitives in an information-theoretic setting.
arXiv Detail & Related papers (2024-11-05T02:20:29Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Quantum advantage in a unified scenario and secure detection of
resources [55.2480439325792]
We consider a single task to study different approaches of having quantum advantage.
We show that the optimal success probability in the overall process for a qubit communication might be higher than that for a cbit communication.
arXiv Detail & Related papers (2023-09-22T23:06:20Z) - Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions [12.45203887838637]
We construct quantum public-key encryption from one-way functions.
In our construction, public keys are quantum, but ciphertexts are classical.
arXiv Detail & Related papers (2023-04-04T13:57:17Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more [125.99533416395765]
Many cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob.
We show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem.
This means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical.
arXiv Detail & Related papers (2022-01-31T18:56:31Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Two-way Unclonable Encryption with a vulnerable sender [2.355458445741348]
Unclonable Encryption, introduced by Gottesman in 2003, is a quantum protocol that guarantees the secrecy of a successfully transferred classical message.
We propose an Unclonable Encryption protocol with the additional property that the sender's key material is allowed to leak even in the case of an unsuccessful run.
arXiv Detail & Related papers (2020-10-21T08:35:49Z) - Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with
almost no classical communication [2.355458445741348]
We show that it is possible to put the message entirely in qubits without increasing the number of qubits.
We introduce a prepare-and-measure QKR protocol where the communication from Alice to Bob consists entirely of qubits.
arXiv Detail & Related papers (2020-03-26T08:59:49Z) - Asymptotic security analysis of teleportation based quantum cryptography [0.0]
We prove that the teleportation based quantum cryptography protocol presented in [Opt. Commun 283, 184] is secure against all types of individual and collective attacks.
We then investigate modifications to that protocol leading to greater secret-key rates and to security against coherent attacks.
arXiv Detail & Related papers (2020-02-10T17:54:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.