Composably secure device-independent encryption with certified deletion
نویسندگان
چکیده
We study the task of encryption with certified deletion (ECD) introduced by Broadbent and Islam (2020), but in a device-independent setting: we show that it is possible to achieve this even when honest parties do not trust their quantum devices. Moreover, define security for ECD composable manner our protocol satisfies conditions lead security. Our based on key distribution (DIQKD), particular parallel DIQKD magic square non-local game, given Jain, Miller Shi (2020). To deletion, use property game observed Fu (2018), namely two-round variant can be used certify single random bit. In order arbitrarily long messages from property, prove repetition theorem games, which may independent interest.
منابع مشابه
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...
متن کاملUsing different encryption schemes for secure deletion while supporting queries
As more and more private and confidential data is stored in databases and in the wake of cloud computing services hosted by third parties, the privacyaware and secure handling of such sensitive data is important. The security of such data needs not only be guaranteed during the actual life, but also at the point where they should be deleted. However, current common database management systems t...
متن کاملProvably Secure Certified Mail
With a certified-mail protocol, one fairly exchanges a message for a receipt. No satisfactory protocols without any third party are possible, hence optimistic protocols are the best one can hope for. Here a third party is only involved if one party tries to cheat. Certified-mail protocols are known in the literature, but there was no rigorous definition yet, in particular for the optimistic cas...
متن کاملDesign and Implementation of a Secure Linux Device Encryption Architecture
The EMSCB Security Architecture is used as a trustworthy basis for the implementation of secure distributed applications. In this paper we introduce the prototype for a device encryption system based on the EMSCB security kernel. The goal is to provide a strongly isolated hard-disk encryption for Linux, where the secret key information and all related security-critical operations are not under ...
متن کاملSecure Self-Certified COTS
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum
سال: 2023
ISSN: ['2521-327X']
DOI: https://doi.org/10.22331/q-2023-07-06-1047