Publicly-Verifiable Deletion via Target-Collapsing Functions

03/15/2023
by   James Bartusek, et al.
0

We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled image. We show that target-collapsing hashes enable publicly-verifiable deletion (PVD), proving conjectures from [Poremba, ITCS'23] and demonstrating that the Dual-Regev encryption (and corresponding fully homomorphic encryption) schemes support PVD under the LWE assumption. We further build on this framework to obtain a variety of primitives supporting publicly-verifiable deletion from weak cryptographic assumptions, including: - Commitments with PVD assuming the existence of injective one-way functions, or more generally, almost-regular one-way functions. Along the way, we demonstrate that (variants of) target-collapsing hashes can be built from almost-regular one-way functions. - Public-key encryption with PVD assuming trapdoored variants of injective (or almost-regular) one-way functions. We also demonstrate that the encryption scheme of [Hhan, Morimae, and Yamakawa, Eurocrypt'23] based on pseudorandom group actions has PVD. - X with PVD for X ∈{attribute-based encryption, quantum fully-homomorphic encryption, witness encryption, time-revocable encryption}, assuming X and trapdoored variants of injective (or almost-regular) one-way functions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/14/2023

Publicly Verifiable Deletion from Minimal Assumptions

We present a general compiler to add the publicly verifiable deletion pr...
research
05/12/2021

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive...
research
04/19/2023

Weakening Assumptions for Publicly-Verifiable Deletion

We develop a simple compiler that generically adds publicly-verifiable d...
research
03/09/2023

Encryption with Quantum Public Keys

It is an important question to find constructions of quantum cryptograph...
research
04/05/2022

Verifiable Quantum Advantage without Structure

We show the following hold, unconditionally unless otherwise stated, rel...
research
03/03/2022

Quantum Proofs of Deletion for Learning with Errors

Quantum information has the property that measurement is an inherently d...
research
02/21/2021

A Ransomware Classification Framework Based on File-Deletion and File-Encryption Attack Structures

Ransomware has emerged as an infamous malware that has not escaped a lot...

Please sign up or login with your details

Forgot password? Click here to reset