We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:


Current browse context:


Change to browse by:

References & Citations


(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Quantum Physics

Title: Cryptography with Certified Deletion

Abstract: We propose a new, unifying framework that yields an array of cryptographic primitives with certified deletion. These primitives enable a party in possession of a quantum ciphertext to generate a classical certificate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources.
- For X \in {public-key, attribute-based, fully-homomorphic, witness, timed-release}, our compiler converts any (post-quantum) X encryption to X encryption with certified deletion. In addition, we compile statistically-binding commitments to statistically-binding commitments with certified everlasting hiding. As a corollary, we also obtain statistically-sound zero-knowledge proofs for QMA with certified everlasting zero-knowledge assuming statistically-binding commitments.
- We also obtain a strong form of everlasting security for two-party and multi-party computation in the dishonest majority setting. While simultaneously achieving everlasting security against all parties in this setting is known to be impossible, we introduce everlasting security transfer (EST). This enables any one party (or a subset of parties) to dynamically and certifiably information-theoretically delete other participants' data after protocol execution. We construct general-purpose secure computation with EST assuming statistically-binding commitments, which can be based on one-way functions or pseudorandom quantum states.
We obtain our results by developing a novel proof technique to argue that a bit b has been information-theoretically deleted from an adversary's view once they output a valid deletion certificate, despite having been previously information-theoretically determined by the ciphertext they held in their view. This technique may be of independent interest.
Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR)
Cite as: arXiv:2207.01754 [quant-ph]
  (or arXiv:2207.01754v4 [quant-ph] for this version)

Submission history

From: James Bartusek [view email]
[v1] Tue, 5 Jul 2022 00:48:06 GMT (3979kb)
[v2] Thu, 7 Jul 2022 07:21:05 GMT (3973kb)
[v3] Thu, 8 Sep 2022 20:00:46 GMT (4014kb)
[v4] Sun, 27 Nov 2022 00:49:12 GMT (4017kb)

Link back to: arXiv, form interface, contact.