Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding

03/26/2021
by   Christian Majenz, et al.
0

We study uncloneable quantum encryption schemes for classical messages as recently proposed by Broadbent and Lord. We focus on the information-theoretic setting and give several limitations on the structure and security of these schemes: Concretely, 1) We give an explicit cloning-indistinguishable attack that succeeds with probability 1/2 + μ/16 where μ is related to the largest eigenvalue of the resulting quantum ciphertexts. 2) For a uniform message distribution, we partially characterize the scheme with the minimal success probability for cloning attacks. 3) Under natural symmetry conditions, we prove that the rank of the ciphertext density operators has to grow at least logarithmically in the number of messages to ensure uncloneable security. 4) The simultaneous one-way-to-hiding (O2H) lemma is an important technique in recent works on uncloneable encryption and quantum copy protection. We give an explicit example which shatters the hope of reducing the multiplicative "security loss" constant in this lemma to below 9/8.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/11/2022

Uncloneable Decryptors from Quantum Copy-Protection

Uncloneable decryptors are encryption schemes (with classical plaintexts...
research
07/14/2022

On the Feasibility of Unclonable Encryption, and More

Unclonable encryption, first introduced by Broadbent and Lord (TQC'20), ...
research
03/01/2020

Make Quantum Indistinguishability Great Again

In this work we study the (superposition-based, or QS2) quantum security...
research
07/12/2021

Hidden Cosets and Applications to Unclonable Cryptography

In this work, we study a generalization of hidden subspace states to hid...
research
11/15/2019

Weak approximate unitary designs and applications to quantum encryption

Unitary t-designs are the bread and butter of quantum information theory...
research
08/17/2023

Experimental quantum e-commerce

E-commerce, a type of trading that occurs at a high frequency on the Int...
research
02/09/2019

A Novel Data Encryption Algorithm Design and Implementation in Information Security Scope

Today, the protection of information, ensuring of the safety and the rec...

Please sign up or login with your details

Forgot password? Click here to reset