Cryptography with Certified Deletion
- URL: http://arxiv.org/abs/2207.01754v5
- Date: Thu, 20 Apr 2023 16:26:23 GMT
- Title: Cryptography with Certified Deletion
- Authors: James Bartusek and Dakshita Khurana
- Abstract summary: We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion.
primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted.
- Score: 16.354530084834863
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We propose a new, unifying framework that yields an array of cryptographic
primitives with certified deletion. These primitives enable a party in
possession of a quantum ciphertext to generate a classical certificate that the
encrypted plaintext has been information-theoretically deleted, and cannot be
recovered even given unbounded computational resources.
- For X \in {public-key, attribute-based, fully-homomorphic, witness,
timed-release}, our compiler converts any (post-quantum) X encryption to X
encryption with certified deletion. In addition, we compile
statistically-binding commitments to statistically-binding commitments with
certified everlasting hiding. As a corollary, we also obtain
statistically-sound zero-knowledge proofs for QMA with certified everlasting
zero-knowledge assuming statistically-binding commitments.
- We also obtain a strong form of everlasting security for two-party and
multi-party computation in the dishonest majority setting. While simultaneously
achieving everlasting security against all parties in this setting is known to
be impossible, we introduce everlasting security transfer (EST). This enables
any one party (or a subset of parties) to dynamically and certifiably
information-theoretically delete other participants' data after protocol
execution. We construct general-purpose secure computation with EST assuming
statistically-binding commitments, which can be based on one-way functions or
pseudorandom quantum states.
We obtain our results by developing a novel proof technique to argue that a
bit b has been information-theoretically deleted from an adversary's view once
they output a valid deletion certificate, despite having been previously
information-theoretically determined by the ciphertext they held in their view.
This technique may be of independent interest.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme [0.0]
This study proposes a post-quantum cryptography McEliece-Chen (PQCMC) based on an efficient random invertible matrix generation method to issue pseudonymous certificates with less time.
This study demonstrates the viability of the implicit certificate scheme based on PQC as a means of countering quantum computing threats.
arXiv Detail & Related papers (2024-01-03T13:34:20Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Certified Everlasting Functional Encryption [10.973034520723957]
Computational security in cryptography has a risk that computational assumptions underlying the security are broken in the future.
A nice compromise (intrinsic to quantum) is certified everlasting security, which roughly means the following.
Although several cryptographic primitives, such as commitments and zero-knowledge, have been made certified everlasting secure, there are many other important primitives that are not known to be certified everlasting secure.
arXiv Detail & Related papers (2022-07-28T04:15:26Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Certified Everlasting Zero-Knowledge Proof for QMA [10.973034520723957]
We introduce a novel compromise, which we call the certified zero-knowledge proof for QMA.
It is a computational zero-knowledge proof for QMA, but the verifier issues a classical certificate that shows that the verifier has deleted its quantum information.
We construct a certified everlasting zero-knowledge proof for QMA.
arXiv Detail & Related papers (2021-09-29T03:05:44Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Quantum Encryption with Certified Deletion, Revisited: Public Key,
Attribute-Based, and Classical Communication [10.973034520723957]
Broadbent and Islam proposed a quantum cryptographic primitive called quantum encryption with certified deletion.
In this primitive, a receiver in possession of a quantum ciphertext can generate a classical certificate that the encrypted message is deleted.
Although deletion certificates are privately verifiable, which means a verification key for a certificate has to be kept secret, in the definition by Broadbent and Islam, we can also consider public verifiability.
arXiv Detail & Related papers (2021-05-12T01:41:46Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.