Unclonable Encryption, Revisited

نویسندگان

چکیده

Unclonable encryption, introduced by Broadbent and Lord (TQC’20), is an encryption scheme with the following attractive feature: given a ciphertext, adversary cannot create two ciphertexts both of which decrypt to same message as original ciphertext.We revisit this notion show following: 1. Reusability: The constructions proposed have disadvantage that they either guarantee one-time security (that is, key can only be used once encrypt message) in plain model or guaranteed random oracle model. We construct unclonable schemes semantic security. present from minimal cryptographic assumptions: (i) private-key assuming post-quantum one-way functions and, (ii) public-key scheme. 2. Lower Bound Generalized Construction: information-theoretic secure construction Lord. success probability their was \(0.85^n\), where n length message. It interesting understand whether ideal (negligibly close to) \(0.5^n\) unattainable. generalize based on broader class monogamy entanglement games (while BB84 game). demonstrate simple cloning attack succeeds \(0.71^n\) against including also \(0.75^n\) exclusively 3. Implication Copy-Protection: satisfying stronger property, called unclonable-indistinguishability (defined Lord), implies copy-protection for unlearnable functions. While we currently don’t implication demonstrates new path copy-protection.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unclonable encryption revisited

Unclonable Encryption is a technique similar to Quantum Key Distribution and authentication of quantum states; it quantum-protects classical ciphertext so that it cannot be copied by eavesdroppers. We propose an improved variant which has higher efficiency and much better noise tolerance. Our variant uses four cipherstate bases that are equally spaced on the Bloch sphere, instead of the usual +...

متن کامل

Barrel Shifter Physical Unclonable Function Based Encryption

Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process. It differs for each device enabling chip-level authentication and key generation [1] applications. We present a protocol utilizing a PUF for secure data transmission. Parties each have a PUF used for encryption and decryptio...

متن کامل

Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions

Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, called memory attacks, has received increasingly more attention. These attacks allow an adversary to measure a significant fraction of secret key bits directly from memory, independent of any computational side-channels. Physically ...

متن کامل

Robust Encryption, Revisited

We revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of the main motivations for the introduction of strong robustness for public-key encryption (PKE) by Abdalla et al. to prevent certain types of attack on Sako’s auction protocol. We show, perhaps surprisingly, that Sako’s protocol is still vulnerable to attacks exploiting robustness problems in the un...

متن کامل

Certified Encryption Revisited

The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-90459-3_11