Unclonable Encryption, Revisited
نویسندگان
چکیده
Unclonable encryption, introduced by Broadbent and Lord (TQC’20), is an encryption scheme with the following attractive feature: given a ciphertext, adversary cannot create two ciphertexts both of which decrypt to same message as original ciphertext.We revisit this notion show following: 1. Reusability: The constructions proposed have disadvantage that they either guarantee one-time security (that is, key can only be used once encrypt message) in plain model or guaranteed random oracle model. We construct unclonable schemes semantic security. present from minimal cryptographic assumptions: (i) private-key assuming post-quantum one-way functions and, (ii) public-key scheme. 2. Lower Bound Generalized Construction: information-theoretic secure construction Lord. success probability their was \(0.85^n\), where n length message. It interesting understand whether ideal (negligibly close to) \(0.5^n\) unattainable. generalize based on broader class monogamy entanglement games (while BB84 game). demonstrate simple cloning attack succeeds \(0.71^n\) against including also \(0.75^n\) exclusively 3. Implication Copy-Protection: satisfying stronger property, called unclonable-indistinguishability (defined Lord), implies copy-protection for unlearnable functions. While we currently don’t implication demonstrates new path copy-protection.
منابع مشابه
Unclonable encryption revisited
Unclonable Encryption is a technique similar to Quantum Key Distribution and authentication of quantum states; it quantum-protects classical ciphertext so that it cannot be copied by eavesdroppers. We propose an improved variant which has higher efficiency and much better noise tolerance. Our variant uses four cipherstate bases that are equally spaced on the Bloch sphere, instead of the usual +...
متن کاملBarrel Shifter Physical Unclonable Function Based Encryption
Physical Unclonable Functions (PUFs) are circuits designed to extract physical randomness from the underlying circuit. This randomness depends on the manufacturing process. It differs for each device enabling chip-level authentication and key generation [1] applications. We present a protocol utilizing a PUF for secure data transmission. Parties each have a PUF used for encryption and decryptio...
متن کاملMemory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, called memory attacks, has received increasingly more attention. These attacks allow an adversary to measure a significant fraction of secret key bits directly from memory, independent of any computational side-channels. Physically ...
متن کاملRobust Encryption, Revisited
We revisit the notions of robustness introduced by Abdalla, Bellare, and Neven (TCC 2010). One of the main motivations for the introduction of strong robustness for public-key encryption (PKE) by Abdalla et al. to prevent certain types of attack on Sako’s auction protocol. We show, perhaps surprisingly, that Sako’s protocol is still vulnerable to attacks exploiting robustness problems in the un...
متن کاملCertified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-90459-3_11