On the Feasibility of Unclonable Encryption, and More
- URL: http://arxiv.org/abs/2207.06589v1
- Date: Thu, 14 Jul 2022 01:03:56 GMT
- Title: On the Feasibility of Unclonable Encryption, and More
- Authors: Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu, Mark
Zhandry
- Abstract summary: We show that encryption schemes satisfying unclonable indistinguishability exist unconditionally in the quantum random oracle model.
We also establish the feasibility of copy-protection for single-bit output point functions.
- Score: 16.64327673223307
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Unclonable encryption, first introduced by Broadbent and Lord (TQC'20), is a
one-time encryption scheme with the following security guarantee: any non-local
adversary (A, B, C) cannot simultaneously distinguish encryptions of two equal
length messages. This notion is termed as unclonable indistinguishability.
Prior works focused on achieving a weaker notion of unclonable encryption,
where we required that any non-local adversary (A, B, C) cannot simultaneously
recover the entire message m. Seemingly innocuous, understanding the
feasibility of encryption schemes satisfying unclonable indistinguishability
(even for 1-bit messages) has remained elusive.
We make progress towards establishing the feasibility of unclonable
encryption.
- We show that encryption schemes satisfying unclonable indistinguishability
exist unconditionally in the quantum random oracle model.
- Towards understanding the necessity of oracles, we present a negative
result stipulating that a large class of encryption schemes cannot satisfy
unclonable indistinguishability.
- Finally, we also establish the feasibility of another closely related
primitive: copy-protection for single-bit output point functions. Prior works
only established the feasibility of copy-protection for multi-bit output point
functions or they achieved constant security error for single-bit output point
functions.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography [5.360892674012226]
We present a new approach to unclonable encryption via a reduction to a novel question about nonlocal quantum state discrimination.
Our main technical result is showing that the players cannot distinguish between each player receiving independently-chosen Haar random states versus all players receiving the same Haar random state.
We also show other implications to single-decryptor encryption and leakage-resilient secret sharing.
arXiv Detail & Related papers (2024-05-16T17:30:55Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - A Modular Approach to Unclonable Cryptography [4.336971448707467]
We propose unclonable puncturable obfuscation (UPO) and study its implications for unclonable cryptography.
We present modular (and arguably, simple) constructions of many primitives in unclonable cryptography.
We show that any cryptographic functionality can be copy-protected as long as this functionality satisfies a notion of security.
arXiv Detail & Related papers (2023-11-20T16:22:52Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and
More [6.375982344506753]
We show that one-time strong anti-piracy secure secret key single-decryptor encryption (SDE) implies one-out-of-many indistinguishable-secure unclonable encryption.
We construct one-out-of-many unclonable predicate encryption (PE) from one-out-of-many indistinguishable-secure unclonable encryption and the LWE assumption.
arXiv Detail & Related papers (2023-02-20T08:50:13Z) - Device-independent uncloneable encryption [0.0]
We introduce a variant of uncloneable encryption in which several possible decryption keys can decrypt a particular encryption.
We show that this variant of uncloneable encryption can be achieved device-independently.
We show that a simple modification of our scheme yields a single-decryptor encryption scheme.
arXiv Detail & Related papers (2022-10-03T16:17:01Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding [17.660958043781154]
We study uncloneable quantum encryption schemes for classical messages.
We focus on the information-theoretic setting and give several limitations on the structure and security of these schemes.
arXiv Detail & Related papers (2021-03-26T15:12:10Z) - Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [48.94443749859216]
We introduce a quantum copy-protection scheme for a class of evasive functions known as " compute-and-compare programs"
We prove that our scheme achieves non-trivial security against fully malicious adversaries in the quantum random oracle model (QROM)
As a complementary result, we show that the same scheme fulfils a weaker notion of software protection, called "secure software leasing"
arXiv Detail & Related papers (2020-09-29T08:41:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.