Secure Software Leasing from Standard Assumptions

被引:13
|
作者
Kitagawa, Fuyuki [1 ]
Nishimaki, Ryo [1 ]
Yamakawa, Takashi [1 ]
机构
[1] NTT Corp, Tokyo, Japan
来源
关键词
D O I
10.1007/978-3-030-90459-3_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure software leasing (SSL) is a quantum cryptographic primitive that enables an authority to lease software to a user by encoding it into a quantum state. SSL prevents users from generating authenticated pirated copies of leased software, where authenticated copies indicate those run on legitimate platforms. Although SSL is a relaxed variant of quantum copy protection that prevents users from generating any copy of leased softwares, it is still meaningful and attractive. Recently, Ananth and La Placa proposed the first SSL scheme. It satisfies a strong security notion called infinite-term security. On the other hand, it has a drawback that it is based on public key quantum money, which is not instantiated with standard cryptographic assumptions so far. Moreover, their scheme only supports a subclass of evasive functions. In this work, we present SSL schemes that satisfy a security notion called finite-term security based on the learning with errors assumption (LWE). Finite-term security is weaker than infinite-term security, but it still provides a reasonable security guarantee. Specifically, our contributions consist of the following. - We construct a finite-term secure SSL scheme for pseudorandom functions from the LWE assumption against quantum adversaries. - We construct a finite-term secure SSL scheme for a subclass of evasive functions from the LWE assumption against sub-exponential quantum adversaries. - We construct finite-term secure SSL schemes for the functionalities above with classical communication from the LWE assumption against (sub-exponential) quantum adversaries. SSL with classical communication means that entities exchange only classical information though they run quantum computation locally. Our crucial tool is two-tier quantum lightning, which is introduced in this work and a relaxed version of quantum lighting. In two-tier quantum lightning schemes, we have a public verification algorithm called semiverification and a private verification algorithm called full-verification. An adversary cannot generate possibly entangled two quantum states whose serial numbers are the same such that one passes the semiverification, and the other also passes the full-verification. We show that we can construct a two-tier quantum lightning scheme from the LWE assumption.
引用
收藏
页码:31 / 61
页数:31
相关论文
共 50 条
  • [1] Secure Software Leasing Without Assumptions
    Broadbent, Anne
    Jeffery, Stacey
    Lord, Sebastien
    Podder, Supartha
    Sundaram, Aarthi
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 90 - 120
  • [2] Secure Software Leasing
    Ananth, Prabhanjan
    La Placa, Rolando L.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 501 - 530
  • [3] Weakly Secure Equivalence-Class Signatures from Standard Assumptions
    Fuchsbauer, Georg
    Gay, Romain
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 : 153 - 183
  • [4] Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
    Agrawal, Shweta
    Libert, Benoit
    Stehle, Damien
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 333 - 362
  • [5] Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions
    Benhamouda, Fabrice
    Lin, Huijia
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 175 - 205
  • [6] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [7] Fully secure hidden vector encryption under standard assumptions
    Park, Jong Hwan
    Lee, Kwangsu
    Susilo, Willy
    Lee, Dong Hoon
    [J]. INFORMATION SCIENCES, 2013, 232 : 188 - 207
  • [8] Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions
    Lyu, Lin
    Liu, Shengli
    Han, Shuai
    Gu, Dawu
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 62 - 92
  • [9] Adaptively secure broadcast encryption under standard assumptions with better efficiency
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. IET INFORMATION SECURITY, 2015, 9 (03) : 149 - 157
  • [10] Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
    Hara, Keisuke
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. THEORETICAL COMPUTER SCIENCE, 2019, 795 : 570 - 597