Functional Encryption in the Bounded Storage Models

09/13/2023
by   Mohammed Barhoush, et al.
0

Functional encryption is a powerful paradigm for public-key encryption which allows for controlled access to encrypted data. This primitive is generally impossible in the standard setting so we investigate possibilities in the bounded quantum storage model (BQSM) and the bounded classical storage model (BCSM). In these models, ciphertexts potentially disappear which nullifies impossibility results and allows us to obtain positive outcomes. Firstly, in the BQSM, we construct information-theoretically secure functional encryption with =O(√(/)) where can be set to any value less than . Here denotes the number of times that an adversary is restricted to –qubits of quantum memory in the protocol and denotes the required quantum memory to run the protocol honestly. We then show that our scheme is optimal by proving that it is impossible to attain information-theoretically secure functional encryption with < √(/). However, by assuming the existence of post-quantum one-way functions, we can do far better and achieve functional encryption with classical keys and with =0 and =1. Secondly, in the BCSM, we construct (O(),^2) functional encryption assuming the existence of (,^2) virtual weak grey-box obfuscation. Here, the pair (,^2) indicates the required memory to run honestly and the needed memory to break security, respectively. This memory gap is optimal and the assumption is minimal. In particular, we also construct (O(),^2) virtual weak grey-box obfuscation assuming (,^2) functional encryption.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/12/2021

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive...
research
07/28/2022

Certified Everlasting Functional Encryption

Computational security in cryptography has a risk that computational ass...
research
02/11/2023

Powerful Primitives in the Bounded Quantum Storage Model

The bounded quantum storage model aims to achieve security against compu...
research
02/20/2023

Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More

We study certified everlasting secure functional encryption (FE) and man...
research
02/12/2023

Randomly Choose an Angle from an Immense Number of Angles to Rotate Qubits, Compute and Reverse

This paper studies information-theoretically secure quantum homomorphic ...
research
06/11/2021

A survey on Functional Encryption

Functional Encryption (FE) expands traditional public-key encryption in ...
research
02/18/2019

Proving Erasure

It seems impossible to certify that a remote hosting service does not le...

Please sign up or login with your details

Forgot password? Click here to reset