TY - GEN
T1 - Publicly-Verifiable Deletion via Target-Collapsing Functions
AU - Bartusek, James
AU - Khurana, Dakshita
AU - Poremba, Alexander
N1 - A.P. is partially supported by AFOSR YIP (award number FA9550-16-1-0495), the Institute for Quantum Information and Matter (an NSF Physics Frontiers Center; NSF Grant PHY-1733907) and by a grant from the Simons Foundation (828076, TV).
D.K. was supported in part by NSF CAREER CNS-2238718, NSF CNS-2247727 and DARPA SIEVE. This material is based upon work supported by the Defense Advanced Research Projects Agency through Award HR00112020024. A.P. is partially supported by AFOSR YIP (award number FA9550-16-1-0495), the Institute for Quantum Information and Matter (an NSF Physics Frontiers Center; NSF Grant PHY-1733907) and by a grant from the Simons Foundation (828076, TV).
NSF CNS-2247727 and DARPA SIEVE. This material is based upon work supported by the Defense Advanced Research Projects Agency through Award HR00112020024.
Acknowledgements. D.K. was supported in part by NSF CAREER CNS-2238718,
PY - 2023
Y1 - 2023
N2 - We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled image. We show that target-collapsing hashes enable publicly-verifiable deletion (PVD ), proving conjectures from [Poremba, ITCS’23] and demonstrating that the Dual-Regev encryption (and corresponding fully homomorphic encryption) schemes support PVD under the LWE assumption. We further build on this framework to obtain a variety of primitives supporting publicly-verifiable deletion from weak cryptographic assumptions, including: Commitments with PVD assuming the existence of injective one-way functions, or more generally, almost-regular one-way functions. Along the way, we demonstrate that (variants of) target-collapsing hashes can be built from almost-regular one-way functions.Public-key encryption with PVD assuming trapdoored variants of injective (or almost-regular) one-way functions. We also demonstrate that the encryption scheme of [Hhan, Morimae, and Yamakawa, Eurocrypt’23] based on pseudorandom group actions has PVD.X with PVD for X∈ { attribute-based encryption, quantum fully-homomorphic encryption, witness encryption, time-revocable encryption }, assuming X and trapdoored variants of injective (or almost-regular) one-way functions.
AB - We build quantum cryptosystems that support publicly-verifiable deletion from standard cryptographic assumptions. We introduce target-collapsing as a weakening of collapsing for hash functions, analogous to how second preimage resistance weakens collision resistance; that is, target-collapsing requires indistinguishability between superpositions and mixtures of preimages of an honestly sampled image. We show that target-collapsing hashes enable publicly-verifiable deletion (PVD ), proving conjectures from [Poremba, ITCS’23] and demonstrating that the Dual-Regev encryption (and corresponding fully homomorphic encryption) schemes support PVD under the LWE assumption. We further build on this framework to obtain a variety of primitives supporting publicly-verifiable deletion from weak cryptographic assumptions, including: Commitments with PVD assuming the existence of injective one-way functions, or more generally, almost-regular one-way functions. Along the way, we demonstrate that (variants of) target-collapsing hashes can be built from almost-regular one-way functions.Public-key encryption with PVD assuming trapdoored variants of injective (or almost-regular) one-way functions. We also demonstrate that the encryption scheme of [Hhan, Morimae, and Yamakawa, Eurocrypt’23] based on pseudorandom group actions has PVD.X with PVD for X∈ { attribute-based encryption, quantum fully-homomorphic encryption, witness encryption, time-revocable encryption }, assuming X and trapdoored variants of injective (or almost-regular) one-way functions.
UR - http://www.scopus.com/inward/record.url?scp=85173003635&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85173003635&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-38554-4_4
DO - 10.1007/978-3-031-38554-4_4
M3 - Conference contribution
AN - SCOPUS:85173003635
SN - 9783031385537
T3 - Lecture Notes in Computer Science
SP - 99
EP - 128
BT - Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings
A2 - Handschuh, Helena
A2 - Lysyanskaya, Anna
PB - Springer
T2 - 43rd Annual International Cryptology Conference, CRYPTO 2023
Y2 - 20 August 2023 through 24 August 2023
ER -