Secure Software Leasing
- URL: http://arxiv.org/abs/2005.05289v2
- Date: Sun, 25 Oct 2020 00:08:08 GMT
- Title: Secure Software Leasing
- Authors: Prabhanjan Ananth and Rolando L. La Placa
- Abstract summary: We formulate an alternative definition for tackling software piracy, called secure software leasing (SSL)
Our construction is the first provably secure solution, based on concrete cryptographic assumptions, for software anti-piracy.
To complement our positive result, we show, based on cryptographic assumptions, that there is a class of quantum unlearnable functions for which SSL does not exist.
- Score: 7.754062965937491
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Formulating cryptographic definitions to protect against software piracy is
an important research direction that has not received much attention. Since
natural definitions using classical cryptography are impossible to achieve (as
classical programs can always be copied), this directs us towards using
techniques from quantum computing. The seminal work of Aaronson [CCC'09]
introduced the notion of quantum copy-protection precisely to address the
problem of software anti-piracy. However, despite being one of the most
important problems in quantum cryptography, there are no provably secure
solutions of quantum copy-protection known for any class of functions.
We formulate an alternative definition for tackling software piracy, called
secure software leasing (SSL). While weaker than quantum copy-protection, SSL
is still meaningful and has interesting applications in software anti-piracy.
We present a construction of SSL for a subclass of evasive circuits (that
includes natural implementations of point functions, conjunctions with wild
cards, and affine testers) based on concrete cryptographic assumptions. Our
construction is the first provably secure solution, based on concrete
cryptographic assumptions, for software anti-piracy. To complement our positive
result, we show, based on cryptographic assumptions, that there is a class of
quantum unlearnable functions for which SSL does not exist. In particular, our
impossibility result also rules out quantum copy-protection [Aaronson CCC'09]
for an arbitrary class of quantum unlearnable functions; resolving an important
open problem on the possibility of constructing copy-protection for arbitrary
quantum unlearnable circuits.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - A Modular Approach to Unclonable Cryptography [4.336971448707467]
We propose unclonable puncturable obfuscation (UPO) and study its implications for unclonable cryptography.
We present modular (and arguably, simple) constructions of many primitives in unclonable cryptography.
We show that any cryptographic functionality can be copy-protected as long as this functionality satisfies a notion of security.
arXiv Detail & Related papers (2023-11-20T16:22:52Z) - How to Use Quantum Indistinguishability Obfuscation [1.6298172960110866]
We show how to achieve "best-possible" copy protection for all programs.
We show that applying qsiO to a program immediately achieves best-possible copy protection.
We also show that, assuming injective one-way functions exist, qsiO is concrete copy protection for a large family of puncturable programs.
arXiv Detail & Related papers (2023-11-13T23:07:25Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Secure Software Leasing Without Assumptions [2.983639510410386]
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone.
Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare.
We show that SSL is achievable for compute-and-compare circuits without any assumptions.
arXiv Detail & Related papers (2021-01-29T18:52:43Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Secure Software Leasing from Standard Assumptions [13.664682865991253]
We present SSL schemes based on the learning errors with assumption (LWE)
We show that we can construct a two-tier quantum lightning scheme from the LWE assumption.
arXiv Detail & Related papers (2020-10-21T17:59:36Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.