Cryptography with Certified Deletion

07/05/2022
by   James Bartusek, et al.
0

We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion. These primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources. For any X ∈{𝗉𝗎𝖻𝗅𝗂𝖼-𝗄𝖾𝗒,𝖺𝗍𝗍𝗋𝗂𝖻𝗎𝗍𝖾-𝖻𝖺𝗌𝖾𝖽,𝖿𝗎𝗅𝗅𝗒-𝗁𝗈𝗆𝗈𝗆𝗈𝗋𝗉𝗁𝗂𝖼,𝗐𝗂𝗍𝗇𝖾𝗌𝗌,𝗍𝗂𝗆𝖾𝖽-𝗋𝖾𝗅𝖾𝖺𝗌𝖾}, our compiler yields post-quantum X encryption with certified deletion, assuming post-quantum X encryption. In addition, assuming the existence of statistically binding commitments, our compiler yields statistically binding commitments with certified everlasting hiding as well as statistically sound zero-knowledge proofs for QMA with certified everlasting zero-knowledge. We also introduce and construct information-theoretic secret sharing with certified deletion. While encryption with certified deletion was first introduced by [BI20] in the context of an information-theoretic one-time pad, existing proposals [Unr14,HMNY21,HMNY22,Por22] for public-key primitives with certified deletion (1) have complex tailored constructions and non-generic proofs, (2) are not known to satisfy everlasting security after deletion in the plain model, and in many cases (3) resort to idealized models or stronger cryptographic assumptions like obfuscation. We remedy this situation by developing a novel proof technique to argue that a bit b has been information-theoretically deleted from an adversary's view once they produce a valid deletion certificate, despite having been previously information-theoretically determined by the ciphertext they held in their view. This may be of independent interest.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro