Publicly Verifiable Deletion from Minimal Assumptions
- URL: http://arxiv.org/abs/2304.07062v1
- Date: Fri, 14 Apr 2023 11:34:43 GMT
- Title: Publicly Verifiable Deletion from Minimal Assumptions
- Authors: Fuyuki Kitagawa, Ryo Nishimaki, Takashi Yamakawa
- Abstract summary: We present a general compiler to add the publicly verifiable deletion property for various cryptographic primitives.
Our compiler only uses one-way functions, or more generally hard quantum planted problems for NP.
- Score: 13.664682865991253
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We present a general compiler to add the publicly verifiable deletion
property for various cryptographic primitives including public key encryption,
attribute-based encryption, and quantum fully homomorphic encryption. Our
compiler only uses one-way functions, or more generally hard quantum planted
problems for NP, which are implied by one-way functions. It relies on minimal
assumptions and enables us to add the publicly verifiable deletion property
with no additional assumption for the above primitives. Previously, such a
compiler needs additional assumptions such as injective trapdoor one-way
functions or pseudorandom group actions [Bartusek-Khurana-Poremba,
ePrint:2023/370]. Technically, we upgrade an existing compiler for privately
verifiable deletion [Bartusek-Khurana, ePrint:2022/1178] to achieve publicly
verifiable deletion by using digital signatures.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - A Modular Approach to Unclonable Cryptography [4.336971448707467]
We propose unclonable puncturable obfuscation (UPO) and study its implications for unclonable cryptography.
We present modular (and arguably, simple) constructions of many primitives in unclonable cryptography.
We show that any cryptographic functionality can be copy-protected as long as this functionality satisfies a notion of security.
arXiv Detail & Related papers (2023-11-20T16:22:52Z) - Weakening Assumptions for Publicly-Verifiable Deletion [79.61363884631021]
We develop a simple compiler that generically adds publicly-verifiable deletion to a variety of cryptosystems.
Our compiler only makes use of one-way functions.
arXiv Detail & Related papers (2023-04-19T17:51:28Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Hidden Cosets and Applications to Unclonable Cryptography [15.248351992500078]
We study a generalization of hidden subspace states to hidden coset states (first introduced by Aaronson and Christiano [STOC '12]).
We explore unclonable properties of coset states and several applications.
arXiv Detail & Related papers (2021-07-12T19:04:01Z) - Glushkov's construction for functional subsequential transducers [91.3755431537592]
Glushkov's construction has many interesting properties and they become even more evident when applied to transducers.
Special flavour of regular expressions is introduced, which can be efficiently converted to $epsilon$-free functional subsequential weighted finite state transducers.
arXiv Detail & Related papers (2020-08-05T17:09:58Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.