Secure Software Leasing from Standard Assumptions
- URL: http://arxiv.org/abs/2010.11186v4
- Date: Mon, 21 Feb 2022 07:32:33 GMT
- Title: Secure Software Leasing from Standard Assumptions
- Authors: Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
- Abstract summary: We present SSL schemes based on the learning errors with assumption (LWE)
We show that we can construct a two-tier quantum lightning scheme from the LWE assumption.
- Score: 13.664682865991253
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Secure software leasing (SSL) is a quantum cryptographic primitive that
enables users to execute software only during the software is leased. It
prevents users from executing leased software after they return the leased
software to its owner. SSL can make software distribution more flexible and
controllable. Although SSL is an attractive cryptographic primitive, the
existing SSL scheme is based on public key quantum money, which is not
instantiated with standard cryptographic assumptions so far. Moreover, the
existing SSL scheme only supports a subclass of evasive functions. In this
work, we present SSL schemes based on the learning with errors assumption
(LWE). Specifically, our contributions consist of the following.
- We construct an SSL scheme for pseudorandom functions from the LWE
assumption against quantum adversaries.
- We construct an SSL scheme for a subclass of evasive functions from the LWE
assumption against sub-exponential quantum adversaries.
- We construct SSL schemes for the functionalities above with classical
communication from the LWE assumption against (sub-exponential) quantum
adversaries. SSL with classical communication means that entities exchange only
classical information though they run quantum computation locally.
Our crucial tool is two-tier quantum lightning, which is introduced in this
work and a relaxed version of quantum lighting. In two-tier quantum lightning
schemes, we have a public verification algorithm called semi-verification and a
private verification algorithm called full-verification. An adversary cannot
generate possibly entangled two quantum states whose serial numbers are the
same such that one passes the semi-verification, and the other also passes the
full-verification. We show that we can construct a two-tier quantum lightning
scheme from the LWE assumption.
Related papers
- On the Power of Oblivious State Preparation [14.520515990983897]
Oblivious State Preparation (OSP) is a cryptographic primitive that unifies techniques developed in the context of a quantum server interacting with a classical client.
Results help to ''explain'' the use of public-key cryptography in approaches to establishing a ''classical leash'' on a quantum server.
arXiv Detail & Related papers (2024-11-06T19:58:53Z) - Quantum Encryption in Phase Space for Coherent Optical Communications [0.0]
Quantum Encryption in Phase Space (QEPS) is a physical layer encryption method to secure data over the optical fiber.
We study two preventative measures for different modulation formats which will prevent an eavesdropper from obtaining any data.
arXiv Detail & Related papers (2023-01-15T15:08:53Z) - A Strong Baseline for Semi-Supervised Incremental Few-Shot Learning [54.617688468341704]
Few-shot learning aims to learn models that generalize to novel classes with limited training samples.
We propose a novel paradigm containing two parts: (1) a well-designed meta-training algorithm for mitigating ambiguity between base and novel classes caused by unreliable pseudo labels and (2) a model adaptation mechanism to learn discriminative features for novel classes while preserving base knowledge using few labeled and all the unlabeled data.
arXiv Detail & Related papers (2021-10-21T13:25:52Z) - Indistinguishability Obfuscation of Null Quantum Circuits and
Applications [17.72516323214125]
We study the notion of indistinguishability obfuscation for null quantum circuits (quantum null-iO)
We show how quantum null-iO enables a series of new cryptographic primitives that, prior to our work, were unknown to exist even making assumptions.
arXiv Detail & Related papers (2021-06-11T00:08:14Z) - End-to-end Generative Zero-shot Learning via Few-shot Learning [76.9964261884635]
State-of-the-art approaches to Zero-Shot Learning (ZSL) train generative nets to synthesize examples conditioned on the provided metadata.
We introduce an end-to-end generative ZSL framework that uses such an approach as a backbone and feeds its synthesized output to a Few-Shot Learning algorithm.
arXiv Detail & Related papers (2021-02-08T17:35:37Z) - Secure Software Leasing Without Assumptions [2.983639510410386]
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone.
Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare.
We show that SSL is achievable for compute-and-compare circuits without any assumptions.
arXiv Detail & Related papers (2021-01-29T18:52:43Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z) - Interventional Few-Shot Learning [88.31112565383457]
We propose a novel Few-Shot Learning paradigm: Interventional Few-Shot Learning.
Code is released at https://github.com/yue-zhongqi/ifsl.
arXiv Detail & Related papers (2020-09-28T01:16:54Z) - Secure Software Leasing [7.754062965937491]
We formulate an alternative definition for tackling software piracy, called secure software leasing (SSL)
Our construction is the first provably secure solution, based on concrete cryptographic assumptions, for software anti-piracy.
To complement our positive result, we show, based on cryptographic assumptions, that there is a class of quantum unlearnable functions for which SSL does not exist.
arXiv Detail & Related papers (2020-05-11T17:48:18Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.