Device-independent uncloneable encryption

AI-generated keywords: Device-independent uncloneable encryption Broadbent and Lord quantum ciphertext decryption keys DI-VKECM

AI-generated Key Points

  • Device-independent uncloneable encryption:
  • Builds upon Broadbent and Lord's work in 2020
  • Generates quantum ciphertext with unique properties
  • Ensures ciphertext sharing between parties unable to collectively decipher plaintext
  • Variant of uncloneable encryption:
  • Multiple decryption keys can unlock specific encryption
  • Security requirement: Parties with independently generated keys cannot jointly uncover ciphertext
  • Achieved device-independently without trust in quantum states and measurements
  • Paper structure:
  • Section 2: Essential notation, background on probability theory and quantum information
  • Section 3: Defines DI-VKECM, outlines security criteria in device-independent setting
  • Sections 4 & 5: Introduce cloning games and present DI-VKECM scheme with security proof
  • Section 6: Adapting scheme for obtaining unclonable bits and trits
  • Section 7: Concludes by proving parallel repetition theorem
  • Explores probability theory concepts (conditional distributions, joint random variables) and quantum information measures (ℓ1 distance, fidelity metrics)
  • Contributes significantly to advancing cryptographic protocols and enhancing security in quantum communication systems
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Srijita Kundu, Ernest Y. -Z. Tan

arXiv: 2210.01058v1 - DOI (quant-ph)
License: CC BY 4.0

Abstract: Uncloneable encryption, first introduced by Broadbent and Lord (TQC 2020), is a form of encryption producing a quantum ciphertext with the property that if the ciphertext is distributed between two non-communicating parties, they cannot both learn the underlying plaintext even after receiving the decryption key. In this work, we introduce a variant of uncloneable encryption in which several possible decryption keys can decrypt a particular encryption, and the security requirement is that two parties who receive independently generated decryption keys cannot both learn the underlying ciphertext. We show that this variant of uncloneable encryption can be achieved device-independently, i.e., without trusting the quantum states and measurements used in the scheme. Moreover, we show that this variant of uncloneable encryption works just as well as the original definition in constructing private-key quantum money, and that uncloneable bits can be achieved in this variant without using the quantum random oracle model.

Submitted to arXiv on 03 Oct. 2022

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2210.01058v1

In this paper, the authors delve into the concept of device-independent uncloneable encryption. They build upon the foundation laid by Broadbent and Lord in 2020 to introduce a unique form of encryption that generates a quantum ciphertext with intriguing properties. This type of encryption ensures that even if the ciphertext is shared between two parties who cannot communicate with each other, they are unable to collectively decipher the original plaintext even with access to the decryption key. Expanding on this idea, the authors introduce a variant of uncloneable encryption where multiple decryption keys have the ability to unlock a specific encryption. The crucial security requirement in this variant is that two separate parties receiving independently generated decryption keys should not be able to jointly uncover the underlying ciphertext. Remarkably, it is demonstrated that this modified version of uncloneable encryption can be achieved in a device-independent manner without relying on trust in quantum states and measurements. The paper is structured as follows: Section 2 lays down essential notation and provides background information on probability theory and quantum information. Moving forward, Section 3 formally defines DI-VKECM (Device-Independent Variant of Key-Evolving Cryptographic Money) and outlines related security criteria within a device-independent setting. In Section 4, two-round cloning games CLONEγ and CLONEγ,α are introduced along with proofs demonstrating that winning probabilities for individual instances are bounded away from 1. Section 5 presents the DI-VKECM scheme along with its security proof utilizing the parallel repetition theorem for CLONEγ,α. Furthermore, Section 6 explores how unclonable bits and trits can be obtained by adapting the scheme outlined in Section 5. Finally, Section 7 concludes by proving the parallel repetition theorem for CLONEγ,α. The paper also delves into probability theory concepts such as conditional distributions and joint random variables while providing insights into quantum information including measures like ℓ1 distance between quantum states and fidelity metrics. Through rigorous analysis and innovative approaches, this research contributes significantly to advancing cryptographic protocols and enhancing security measures in quantum communication systems.
Created on 20 Jun. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.