Public Key Encryption with Secure Key Leasing
- URL: http://arxiv.org/abs/2302.11663v2
- Date: Thu, 6 Apr 2023 15:30:16 GMT
- Title: Public Key Encryption with Secure Key Leasing
- Authors: Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi
Yamakawa
- Abstract summary: We introduce the notion of public key encryption with secure key leasing (PKE-SKL)
Our notion is similar in spirit to the notion of secure software leasing (SSL) introduced by Ananth and La Placa (Eurocrypt 2021)
In more detail, our adversary is not restricted to use an honest evaluation algorithm to run pirated software.
- Score: 24.410596031297242
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We introduce the notion of public key encryption with secure key leasing
(PKE-SKL). Our notion supports the leasing of decryption keys so that a leased
key achieves the decryption functionality but comes with the guarantee that if
the quantum decryption key returned by a user passes a validity test, then the
user has lost the ability to decrypt. Our notion is similar in spirit to the
notion of secure software leasing (SSL) introduced by Ananth and La Placa
(Eurocrypt 2021) but captures significantly more general adversarial
strategies. In more detail, our adversary is not restricted to use an honest
evaluation algorithm to run pirated software. Our results can be summarized as
follows:
1. Definitions: We introduce the definition of PKE with secure key leasing
and formalize security notions.
2. Constructing PKE with Secure Key Leasing: We provide a construction of
PKE-SKL by leveraging a PKE scheme that satisfies a new security notion that we
call consistent or inconsistent security against key leasing attacks (CoIC-KLA
security). We then construct a CoIC-KLA secure PKE scheme using 1-key
Ciphertext-Policy Functional Encryption (CPFE) that in turn can be based on any
IND-CPA secure PKE scheme.
3. Identity Based Encryption, Attribute Based Encryption and Functional
Encryption with Secure Key Leasing: We provide definitions of secure key
leasing in the context of advanced encryption schemes such as identity based
encryption (IBE), attribute-based encryption (ABE) and functional encryption
(FE). Then we provide constructions by combining the above PKE-SKL with
standard IBE, ABE and FE schemes.
Related papers
- A Simple Framework for Secure Key Leasing [10.04587045407742]
Key-revocable cryptography enables us to lease a cryptographic key as a quantum state in such a way that the key can be later revoked in a verifiable manner.
We propose a simple framework for constructing cryptographic primitives with secure key leasing via the certified deletion property of BB84 states.
arXiv Detail & Related papers (2024-10-04T13:24:03Z) - Privacy-Preserving Traceable Functional Encryption for Inner Product [0.3683202928838613]
New primitive called traceable functional encryption for inner product (TFE-IP) has been proposed.
Privacy protection of user's identities has not been considered in the existing TFE-IP schemes.
arXiv Detail & Related papers (2024-04-07T08:09:46Z) - CodeChameleon: Personalized Encryption Framework for Jailbreaking Large
Language Models [49.60006012946767]
We propose CodeChameleon, a novel jailbreak framework based on personalized encryption tactics.
We conduct extensive experiments on 7 Large Language Models, achieving state-of-the-art average Attack Success Rate (ASR)
Remarkably, our method achieves an 86.6% ASR on GPT-4-1106.
arXiv Detail & Related papers (2024-02-26T16:35:59Z) - Quantum Key Leasing for PKE and FHE with a Classical Lessor [19.148581164364387]
We consider the problem of secure key leasing, also known as revocable cryptography.
This problem aims to leverage unclonable nature of quantum information.
We construct a secure key leasing scheme to lease a decryption key of a (classical) public-key, homomorphic encryption scheme.
arXiv Detail & Related papers (2023-10-22T15:25:29Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More [11.28340401863537]
certified everlasting security is a nice compromise (intrinsic to quantum)
We define certified everlasting secure versions of FE, compute-and-compare obfuscation, predicate encryption (PE), secret-key encryption (SKE), public-key encryption (PKE), receiver non-committing encryption (RNCE)
arXiv Detail & Related papers (2023-02-20T22:54:43Z) - Functional Encryption with Secure Key Leasing [6.375982344506753]
cryptographic primitive that enables us to lease software to a user by encoding it into a quantum state.
Secure software leasing has a mechanism that verifies whether a returned software is valid or not.
We introduce the notion of secret-key functional encryption (FEE) with secure key leasing.
arXiv Detail & Related papers (2022-09-27T00:15:00Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.