Composably secure device-independent encryption with certified deletion

نویسندگان

چکیده

We study the task of encryption with certified deletion (ECD) introduced by Broadbent and Islam (2020), but in a device-independent setting: we show that it is possible to achieve this even when honest parties do not trust their quantum devices. Moreover, define security for ECD composable manner our protocol satisfies conditions lead security. Our based on key distribution (DIQKD), particular parallel DIQKD magic square non-local game, given Jain, Miller Shi (2020). To deletion, use property game observed Fu (2018), namely two-round variant can be used certify single random bit. In order arbitrarily long messages from property, prove repetition theorem games, which may independent interest.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Certified Encryption Revisited

The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...

متن کامل

Using different encryption schemes for secure deletion while supporting queries

As more and more private and confidential data is stored in databases and in the wake of cloud computing services hosted by third parties, the privacyaware and secure handling of such sensitive data is important. The security of such data needs not only be guaranteed during the actual life, but also at the point where they should be deleted. However, current common database management systems t...

متن کامل

Provably Secure Certified Mail

With a certified-mail protocol, one fairly exchanges a message for a receipt. No satisfactory protocols without any third party are possible, hence optimistic protocols are the best one can hope for. Here a third party is only involved if one party tries to cheat. Certified-mail protocols are known in the literature, but there was no rigorous definition yet, in particular for the optimistic cas...

متن کامل

Design and Implementation of a Secure Linux Device Encryption Architecture

The EMSCB Security Architecture is used as a trustworthy basis for the implementation of secure distributed applications. In this paper we introduce the prototype for a device encryption system based on the EMSCB security kernel. The goal is to provide a strongly isolated hard-disk encryption for Linux, where the secret key information and all related security-critical operations are not under ...

متن کامل

Secure Self-Certified COTS

With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum

سال: 2023

ISSN: ['2521-327X']

DOI: https://doi.org/10.22331/q-2023-07-06-1047