Public Key Encryption with Secure Key Leasing

02/22/2023
by   Shweta Agrawal, et al.
0

We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our notion supports the leasing of decryption keys so that a leased key achieves the decryption functionality but comes with the guarantee that if the quantum decryption key returned by a user passes a validity test, then the user has lost the ability to decrypt. Our notion is similar in spirit to the notion of secure software leasing (SSL) introduced by Ananth and La Placa (Eurocrypt 2021) but captures significantly more general adversarial strategies. In more detail, our adversary is not restricted to use an honest evaluation algorithm to run pirated software. Our results can be summarized as follows: 1. Definitions: We introduce the definition of PKE with secure key leasing and formalize security notions. 2. Constructing PKE with Secure Key Leasing: We provide a construction of PKE-SKL by leveraging a PKE scheme that satisfies a new security notion that we call consistent or inconsistent security against key leasing attacks (CoIC-KLA security). We then construct a CoIC-KLA secure PKE scheme using 1-key Ciphertext-Policy Functional Encryption (CPFE) that in turn can be based on any IND-CPA secure PKE scheme. 3. Identity Based Encryption, Attribute Based Encryption and Functional Encryption with Secure Key Leasing: We provide definitions of secure key leasing in the context of advanced encryption schemes such as identity based encryption (IBE), attribute-based encryption (ABE) and functional encryption (FE). Then we provide constructions by combining the above PKE-SKL with standard IBE, ABE and FE schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/27/2022

Functional Encryption with Secure Key Leasing

Secure software leasing is a quantum cryptographic primitive that enable...
research
02/21/2018

How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

We study secure and undetectable communication in a world where governme...
research
05/25/2023

Composing Bridges

The present work builds on previous investigations of the authors (and t...
research
08/23/2019

Bi-Homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption

We define a pseudorandom function (PRF) F: K×X→Y to be bi-homomorphic wh...
research
11/20/2021

CINNAMON: A Module for AUTOSAR Secure Onboard Communication

This paper introduces CINNAMON, a software module that extends and seaml...
research
02/18/2020

Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution

Attribute-based Encryption (ABE) is an information centric security solu...
research
06/22/2019

Comparative study of Joint Image Encryption and Compression Schemes: A Review

With the development of imaging methods in wireless communications, enha...

Please sign up or login with your details

Forgot password? Click here to reset