Cryptography with Certified Deletion

07/05/2022
βˆ™
by   James Bartusek, et al.
βˆ™
0
βˆ™

We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion. These primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources. For any X ∈{π—‰π—Žπ–»π—…π—‚π–Ό-𝗄𝖾𝗒,π–Ίπ—π—π—‹π—‚π–»π—Žπ—π–Ύ-π–»π–Ίπ—Œπ–Ύπ–½,π–Ώπ—Žπ—…π—…π—’-π—π—ˆπ—†π—ˆπ—†π—ˆπ—‹π—‰π—π—‚π–Ό,π—π—‚π—π—‡π–Ύπ—Œπ—Œ,𝗍𝗂𝗆𝖾𝖽-π—‹π–Ύπ—…π–Ύπ–Ίπ—Œπ–Ύ}, our compiler yields post-quantum X encryption with certified deletion, assuming post-quantum X encryption. In addition, assuming the existence of statistically binding commitments, our compiler yields statistically binding commitments with certified everlasting hiding as well as statistically sound zero-knowledge proofs for QMA with certified everlasting zero-knowledge. We also introduce and construct information-theoretic secret sharing with certified deletion. While encryption with certified deletion was first introduced by [BI20] in the context of an information-theoretic one-time pad, existing proposals [Unr14,HMNY21,HMNY22,Por22] for public-key primitives with certified deletion (1) have complex tailored constructions and non-generic proofs, (2) are not known to satisfy everlasting security after deletion in the plain model, and in many cases (3) resort to idealized models or stronger cryptographic assumptions like obfuscation. We remedy this situation by developing a novel proof technique to argue that a bit b has been information-theoretically deleted from an adversary's view once they produce a valid deletion certificate, despite having been previously information-theoretically determined by the ciphertext they held in their view. This may be of independent interest.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
βˆ™ 04/14/2023

Publicly Verifiable Deletion from Minimal Assumptions

We present a general compiler to add the publicly verifiable deletion pr...
research
βˆ™ 05/12/2021

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive...
research
βˆ™ 07/28/2022

Certified Everlasting Functional Encryption

Computational security in cryptography has a risk that computational ass...
research
βˆ™ 03/03/2022

Quantum Proofs of Deletion for Learning with Errors

Quantum information has the property that measurement is an inherently d...
research
βˆ™ 04/19/2023

Weakening Assumptions for Publicly-Verifiable Deletion

We develop a simple compiler that generically adds publicly-verifiable d...
research
βˆ™ 02/18/2021

Classically Verifiable (Dual-Mode) NIZK for QMA with Preprocessing

We propose three constructions of classically verifiable non-interactive...
research
βˆ™ 02/18/2019

Proving Erasure

It seems impossible to certify that a remote hosting service does not le...

Please sign up or login with your details

Forgot password? Click here to reset