Public Key Encryption with Secure Key Leasing

被引:6
作者
Agrawal, Shweta [1 ]
Kitagawa, Fuyuki [2 ]
Nishimaki, Ryo [2 ]
Yamada, Shota [3 ]
Yamakawa, Takashi [2 ]
机构
[1] IIT Madras, Chennai, Tamil Nadu, India
[2] NTT Social Informat Labs, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I | 2023年 / 14004卷
关键词
FUNCTIONAL ENCRYPTION; QUANTUM;
D O I
10.1007/978-3-031-30545-0_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce the notion of public key encryption with secure key leasing (PKE-SKL). Our notion supports the leasing of decryption keys so that a leased key achieves the decryption functionality but comes with the guarantee that if the quantum decryption key returned by a user passes a validity test, then the user has lost the ability to decrypt. Our notion is similar in spirit to the notion of secure software leasing (SSL) introduced by Ananth and La Placa (Eurocrypt 2021) but captures significantly more general adversarial strategies. (In more detail, our adversary is not restricted to use an honest evaluation algorithm to run pirated software.) Our results can be summarized as follows: 1. Definitions: We introduce the definition of PKE with secure key leasing and formalize a security notion that we call indistinguishability against key leasing attacks (IND-KLA security). We also define a one-wayness notion for PKE-SKL that we call OW-KLA security and show that an OW-KLA secure PKE-SKL scheme can be lifted to an IND-KLA secure one by using the (quantum) Goldreich-Levin lemma. 2. Constructing IND-KLA PKE with Secure Key Leasing: We provide a construction of OW-KLA secure PKE-SKL (which implies INDKLA secure PKE-SKL as discussed above) by leveraging a PKE scheme that satisfies a new security notion that we call consistent or inconsistent security against key leasing attacks (CoIC-KLA security). We then construct a CoIC-KLA secure PKE scheme using 1-key Ciphertext-Policy Functional Encryption (CPFE) that in turn can be based on any IND-CPA secure PKE scheme. 3. Identity Based Encryption, Attribute Based Encryption and Functional Encryption with Secure Key Leasing: We provide definitions of secure key leasing in the context of advanced encryption schemes such as identity based encryption (IBE), attribute-based encryption (ABE) and functional encryption (FE). Then we provide constructions by combining the above PKE-SKL with standard IBE, ABE and FE schemes. Notably, our definitions allow the adversary to request distinguishing keys in the security game, namely, keys that distinguish the challenge bit by simply decrypting the challenge ciphertext, as long as it returns them (and they pass the validity test) before it sees the challenge ciphertext. All our constructions satisfy this stronger definition, albeit with the restriction that only a bounded number of such keys is allowed to the adversary in the IBE and ABE (but not FE) security games. Prior to our work, the notion of single decryptor encryption (SDE) has been studied in the context of PKE (Georgiou and Zhandry, Eprint 2020) and FE (Kitigawa and Nishimaki, Asiacrypt 2022) but all their constructions rely on strong assumptions including indistinguishability obfuscation. In contrast, our constructions do not require any additional assumptions, showing that PKE/IBE/ABE/FE can be upgraded to support secure key leasing for free.
引用
收藏
页码:581 / 610
页数:30
相关论文
共 37 条
  • [1] New Approaches for Quantum Copy-Protection
    Aaronson, Scott
    Liu, Jiahui
    Liu, Qipeng
    Zhandry, Mark
    Zhang, Ruizhe
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 526 - 555
  • [2] Aaronson S, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P41
  • [3] Quantum Copy-Protection and Quantum Money
    Aaronson, Scott
    [J]. PROCEEDINGS OF THE 24TH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, 2009, : 229 - 242
  • [4] Adcock M., 2002, STACS 2002. 19th Annual Symposium on Theoretical Aspects of Computer Science. Proceedings (Lecture Notes in Computer Science Vol.2285), P323
  • [5] One-Shot Signatures and Applications to Hybrid Quantum/Classical Authentication
    Amos, Ryan
    Georgiou, Marios
    Kiayias, Aggelos
    Zhandry, Mark
    [J]. PROCEEDINGS OF THE 52ND ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '20), 2020, : 255 - 268
  • [6] On the Feasibility of Unclonable Encryption, and More
    Ananth, Prabhanjan
    Kaleoglu, Fatih
    Li, Xingjian
    Liu, Qipeng
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT II, 2022, 13508 : 212 - 241
  • [7] Unclonable Encryption, Revisited
    Ananth, Prabhanjan
    Kaleoglu, Fatih
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 299 - 329
  • [8] Secure Software Leasing
    Ananth, Prabhanjan
    La Placa, Rolando L.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 501 - 530
  • [9] From Selective to Adaptive Security in Functional Encryption
    Ananth, Prabhanjan
    Brakerski, Zvika
    Segev, Gil
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 657 - 677
  • [10] Bartusek J., 2022, Report 2022/1178