DeepAI AI Chat
Log In Sign Up

Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding

by   Christian Majenz, et al.

We study uncloneable quantum encryption schemes for classical messages as recently proposed by Broadbent and Lord. We focus on the information-theoretic setting and give several limitations on the structure and security of these schemes: Concretely, 1) We give an explicit cloning-indistinguishable attack that succeeds with probability 1/2 + μ/16 where μ is related to the largest eigenvalue of the resulting quantum ciphertexts. 2) For a uniform message distribution, we partially characterize the scheme with the minimal success probability for cloning attacks. 3) Under natural symmetry conditions, we prove that the rank of the ciphertext density operators has to grow at least logarithmically in the number of messages to ensure uncloneable security. 4) The simultaneous one-way-to-hiding (O2H) lemma is an important technique in recent works on uncloneable encryption and quantum copy protection. We give an explicit example which shatters the hope of reducing the multiplicative "security loss" constant in this lemma to below 9/8.


page 1

page 2

page 3

page 4


Uncloneable Decryptors from Quantum Copy-Protection

Uncloneable decryptors are encryption schemes (with classical plaintexts...

Uncloneable Encryption, Revisited

Uncloneable encryption, introduced by Broadbent and Lord (TQC'20), is an...

On the Feasibility of Unclonable Encryption, and More

Unclonable encryption, first introduced by Broadbent and Lord (TQC'20), ...

Make Quantum Indistinguishability Great Again

In this work we study the (superposition-based, or QS2) quantum security...

Hidden Cosets and Applications to Unclonable Cryptography

In this work, we study a generalization of hidden subspace states to hid...

Weak approximate unitary designs and applications to quantum encryption

Unitary t-designs are the bread and butter of quantum information theory...

A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope

Today, the protection of information, ensuring of the safety and the rec...