Revocable Cryptography from Learning with Errors

02/28/2023
by   Prabhanjan Ananth, et al.
0

Quantum cryptography leverages many unique features of quantum information in order to construct cryptographic primitives that are oftentimes impossible classically. In this work, we build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities. We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before. We define and construct several fundamental cryptographic primitives with key-revocation capabilities, namely pseudorandom functions, secret-key and public-key encryption, and even fully homomorphic encryption, assuming the quantum subexponential hardness of the learning with errors problem. Central to all our constructions is our approach for making the Dual-Regev encryption scheme (Gentry, Peikert and Vaikuntanathan, STOC 2008) revocable.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2021

Uncloneable Encryption, Revisited

Uncloneable encryption, introduced by Broadbent and Lord (TQC'20), is an...
research
02/20/2023

One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More

The no-cloning principle of quantum mechanics enables us to achieve amaz...
research
02/17/2020

On Higher-Order Cryptography (Long Version)

Type-two constructions abound in cryptography: adversaries for encryptio...
research
01/02/2020

Key-dependent Security of Stream Ciphers

The control of the cryptography is more than ever a recurrent issue. As ...
research
01/23/2018

Post-Quantum Cryptography: Riemann Primitives and Chrysalis

The Chrysalis project is a proposed method for post-quantum cryptography...
research
03/03/2022

Quantum Proofs of Deletion for Learning with Errors

Quantum information has the property that measurement is an inherently d...
research
02/28/2023

Uncloneable Cryptographic Primitives with Interaction

Much of the strength of quantum cryptography may be attributed to the no...

Please sign up or login with your details

Forgot password? Click here to reset