论文标题

从标准假设中获得安全软件租赁

Secure Software Leasing from Standard Assumptions

论文作者

Kitagawa, Fuyuki, Nishimaki, Ryo, Yamakawa, Takashi

论文摘要

安全软件租赁(SSL)是一种量子加密原始性,使用户只能在软件租赁期间执行软件。在将租赁软件退还给所有者之后,它可以防止用户执行租赁软件。 SSL可以使软件分配更加灵活和可控。尽管SSL是一种有吸引力的加密原始性,但现有的SSL方案基于公共密钥量子资金,迄今为止尚未与标准的加密假设实例化。此外,现有的SSL方案仅支持回避功能的子类。在这项工作中,我们基于学习以错误假设(LWE)介绍了SSL方案。具体而言,我们的贡献包括以下内容。 - 我们从针对量子对手的LWE假设中构建了用于伪函数的SSL方案。 - 我们从LWE假设对亚指数量子对手的LWE假设构建了SSL方案。 - 我们通过对(亚指数)量子对手的LWE假设的经典交流来为上述功能构建SSL方案。带有经典通信的SSL意味着实体在本地运行量子计算,但仅交换经典信息。 我们的关键工具是两层Quantum Lightning,这在这项工作中引入了量子照明的轻松版本。在两层量子闪电方案中,我们采用了一种公共验证算法,称为半验证和一种称为全验证的私人验证算法。对手不能产生可能纠缠的两个量子状态,其序列号相同,以使一个状态通过半验证,而另一个也通过全面验证。我们表明,我们可以从LWE假设构建两层量子闪电方案。

Secure software leasing (SSL) is a quantum cryptographic primitive that enables users to execute software only during the software is leased. It prevents users from executing leased software after they return the leased software to its owner. SSL can make software distribution more flexible and controllable. Although SSL is an attractive cryptographic primitive, the existing SSL scheme is based on public key quantum money, which is not instantiated with standard cryptographic assumptions so far. Moreover, the existing SSL scheme only supports a subclass of evasive functions. In this work, we present SSL schemes based on the learning with errors assumption (LWE). Specifically, our contributions consist of the following. - We construct an SSL scheme for pseudorandom functions from the LWE assumption against quantum adversaries. - We construct an SSL scheme for a subclass of evasive functions from the LWE assumption against sub-exponential quantum adversaries. - We construct SSL schemes for the functionalities above with classical communication from the LWE assumption against (sub-exponential) quantum adversaries. SSL with classical communication means that entities exchange only classical information though they run quantum computation locally. Our crucial tool is two-tier quantum lightning, which is introduced in this work and a relaxed version of quantum lighting. In two-tier quantum lightning schemes, we have a public verification algorithm called semi-verification and a private verification algorithm called full-verification. An adversary cannot generate possibly entangled two quantum states whose serial numbers are the same such that one passes the semi-verification, and the other also passes the full-verification. We show that we can construct a two-tier quantum lightning scheme from the LWE assumption.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源