Revocable Cryptography from Learning with Errors

被引:8
|
作者
Ananth, Prabhanjan [1 ]
Poremba, Alexander [2 ]
Vaikuntanathan, Vinod [3 ]
机构
[1] UC Santa Barbara, Santa Barbara, CA USA
[2] CALTECH, Pasadena, CA 91125 USA
[3] MIT, Cambridge, MA USA
来源
关键词
QUANTUM; ENCRYPTION;
D O I
10.1007/978-3-031-48624-1_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum cryptography leverages unique properties of quantum information in order to construct cryptographic primitives that are oftentimes impossible classically. In this work, we build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key revocation capabilities. We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before. We define and construct several fundamental cryptographic primitives with key-revocation capabilities, namely pseudorandom functions, secret-key and public-key encryption, and even fully homomorphic encryption, assuming the quantum sub-exponential hardness of the learning with errors problem. Central to all our constructions is our method of making the Dual-Regev encryption (Gentry, Peikert and Vaikuntanathan, STOC 2008) scheme revocable.
引用
收藏
页码:93 / 122
页数:30
相关论文
共 50 条
  • [1] Efficient Laconic Cryptography from Learning with Errors
    Doettling, Nico
    Kolonelos, Dimitris
    Lai, Russell W. F.
    Lin, Chuanwei
    Malavolta, Giulio
    Rahimi, Ahmadreza
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 417 - 446
  • [2] Revocable Key Generation From Irrevocable Biometric Data for Symmetric Cryptography
    Barman, Subhas
    Samanta, Debasis
    Chattopadhyay, Samiran
    2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT), 2015,
  • [3] On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
    Regev, Oded
    JOURNAL OF THE ACM, 2009, 56 (06)
  • [4] Combining Cryptography and Watermarking to Secure Revocable Iris Templates
    Fouad, Marwa
    El Saddik, Abdulmotaleb
    Zhao, Jiying
    Petriu, Emil
    2011 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2011, : 1734 - 1737
  • [5] Revocable Key Identity Based Cryptography without Key Escrow Problem
    Gupta, Swati
    Gupta, Vipul
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 443 - 448
  • [6] Cryptography from Learning Parity with Noise
    Pietrzak, Krzysztof
    SOFSEM 2012: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2012, 7147 : 99 - 114
  • [7] Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography
    Sabani, Maria E.
    Savvas, Ilias K.
    Garani, Georgia
    SIGNALS, 2024, 5 (02): : 216 - 243
  • [8] Learning from Errors
    Metcalfe, Janet
    ANNUAL REVIEW OF PSYCHOLOGY, VOL 68, 2017, 68 : 465 - 489
  • [9] Secure key issuing scheme in ID-based cryptography with revocable ID
    Tanwar, Sarvesh
    Kumar, Anil
    INFORMATION SECURITY JOURNAL, 2022, 31 (06): : 676 - 685
  • [10] On the correction of errors in quantum cryptography systems
    K. A. Balygin
    A. N. Klimov
    S. P. Kulik
    S. N. Molotkov
    JETP Letters, 2016, 104 : 341 - 346