Secure Software Leasing Without Assumptions

被引:12
|
作者
Broadbent, Anne [1 ]
Jeffery, Stacey [2 ,3 ]
Lord, Sebastien [1 ]
Podder, Supartha [1 ]
Sundaram, Aarthi [4 ]
机构
[1] Univ Ottawa, Ottawa, ON, Canada
[2] QuSoft, Amsterdam, Netherlands
[3] CWI, Amsterdam, Netherlands
[4] Microsoft Quantum, Redmond, WA USA
来源
基金
加拿大自然科学与工程研究理事会;
关键词
D O I
10.1007/978-3-030-90459-3_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas of interest. Given a target circuit C from a circuit class, SSL produces an encoding of C that enables a recipient to evaluate C, and also enables the originator of the software to verify that the software has been returned-meaning that the recipient has relinquished the possibility of any further use of the software. Clearly, such a functionality is unachievable using classical information alone, since it is impossible to prevent a user from keeping a copy of the software. Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare (these are a generalization of the well-known point functions). These prior works, however all make use of setup or computational assumptions. Here, we show that SSL is achievable for compute-and-compare circuits without any assumptions. Our technique involves the study of quantum copy protection, which is a notion related to SSL, but where the encoding procedure inherently prevents a would-be quantum software pirate from splitting a single copy of an encoding for C into two parts, each of which enables a user to evaluate C. We show that point functions can be copy-protected without any assumptions, for a novel security definition involving one honest and one malicious evaluator; this is achieved by showing that from any quantum message authentication code, we can derive such an honest-malicious copy protection scheme. We then show that a generic honest-malicious copy protection scheme implies SSL; by prior work, this yields SSL for compute-and-compare functions.
引用
收藏
页码:90 / 120
页数:31
相关论文
共 50 条
  • [1] Secure Software Leasing from Standard Assumptions
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Yamakawa, Takashi
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 31 - 61
  • [2] Secure Software Leasing
    Ananth, Prabhanjan
    La Placa, Rolando L.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 501 - 530
  • [3] Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 400 - 432
  • [4] SOFTWARE ASSUMPTIONS
    PIETTE, RC
    [J]. PERSONAL COMPUTING, 1983, 7 (05): : 195 - 195
  • [5] Concurrently-secure blind signatures without random oracles or setup assumptions
    Hazay, Carmit
    Katz, Jonathan
    Koo, Chiu-Yuen
    Lindell, Yehuda
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 323 - +
  • [6] Functional Encryption with Secure Key Leasing
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    [J]. ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT IV, 2022, 13794 : 569 - 598
  • [7] Public Key Encryption with Secure Key Leasing
    Agrawal, Shweta
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 581 - 610
  • [8] Assumptions: The Trojan horses of secure protocols
    Verissimo, Paulo
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 34 - 41
  • [9] Functional Encryption Enabling Secure Leasing of Private Keys
    Nishimaki, Ryo
    [J]. NTT Technical Review, 2023, 21 (07): : 33 - 37
  • [10] Secure Software
    McGregor, John D.
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2005, 4 (04): : 33 - 42