Certified Everlasting Functional Encryption
- URL: http://arxiv.org/abs/2207.13878v1
- Date: Thu, 28 Jul 2022 04:15:26 GMT
- Title: Certified Everlasting Functional Encryption
- Authors: Taiga Hiroka, Tomoyuki Morimae, Ryo Nishimaki, Takashi Yamakawa
- Abstract summary: Computational security in cryptography has a risk that computational assumptions underlying the security are broken in the future.
A nice compromise (intrinsic to quantum) is certified everlasting security, which roughly means the following.
Although several cryptographic primitives, such as commitments and zero-knowledge, have been made certified everlasting secure, there are many other important primitives that are not known to be certified everlasting secure.
- Score: 10.973034520723957
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Computational security in cryptography has a risk that computational
assumptions underlying the security are broken in the future. One solution is
to construct information-theoretically-secure protocols, but many cryptographic
primitives are known to be impossible (or unlikely) to have
information-theoretical security even in the quantum world. A nice compromise
(intrinsic to quantum) is certified everlasting security, which roughly means
the following. A receiver with possession of quantum encrypted data can issue a
certificate that shows that the receiver has deleted the encrypted data. If the
certificate is valid, the security is guaranteed even if the receiver becomes
computationally unbounded. Although several cryptographic primitives, such as
commitments and zero-knowledge, have been made certified everlasting secure,
there are many other important primitives that are not known to be certified
everlasting secure.
In this paper, we introduce certified everlasting FE. In this primitive, the
receiver with the ciphertext of a message m and the functional decryption key
of a function f can obtain f(m) and nothing else. The security holds even if
the adversary becomes computationally unbounded after issuing a valid
certificate. We, first, construct certified everlasting FE for P/poly circuits
where only a single key query is allowed for the adversary. We, then, extend it
to q-bounded one for NC1 circuits where q-bounded means that q key queries are
allowed for the adversary with an a priori bounded polynomial q. For the
construction of certified everlasting FE, we introduce and construct certified
everlasting versions of secret-key encryption, public-key encryption, receiver
non-committing encryption, and a garbling scheme, which are of independent
interest.
Related papers
- Relating Quantum Tamper-Evident Encryption to Other Cryptographic Notions [0.0]
A quantum tamper-evident encryption scheme is a non-interactive symmetric-key encryption scheme mapping classical messages to quantum ciphertexts.
This quantum cryptographic primitive was first introduced by Gottesman in 2003.
We further our understanding of tamper-evident encryption by formally relating it to other cryptographic primitives in an information-theoretic setting.
arXiv Detail & Related papers (2024-11-05T02:20:29Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More [11.28340401863537]
certified everlasting security is a nice compromise (intrinsic to quantum)
We define certified everlasting secure versions of FE, compute-and-compare obfuscation, predicate encryption (PE), secret-key encryption (SKE), public-key encryption (PKE), receiver non-committing encryption (RNCE)
arXiv Detail & Related papers (2023-02-20T22:54:43Z) - Cryptography with Certified Deletion [16.354530084834863]
We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion.
primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted.
arXiv Detail & Related papers (2022-07-05T00:48:06Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Quantum Encryption with Certified Deletion, Revisited: Public Key,
Attribute-Based, and Classical Communication [10.973034520723957]
Broadbent and Islam proposed a quantum cryptographic primitive called quantum encryption with certified deletion.
In this primitive, a receiver in possession of a quantum ciphertext can generate a classical certificate that the encrypted message is deleted.
Although deletion certificates are privately verifiable, which means a verification key for a certificate has to be kept secret, in the definition by Broadbent and Islam, we can also consider public verifiability.
arXiv Detail & Related papers (2021-05-12T01:41:46Z) - Security in Quantum Cryptography [5.914028209673859]
Quantum cryptography exploits principles of quantum physics for the secure processing of information.
We review this physical notion of security, focusing on quantum key distribution and secure communication.
arXiv Detail & Related papers (2021-01-29T19:00:54Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.