Watermarking PRFs against quantum adversaries
From MaRDI portal
Publication:2170100
DOI10.1007/978-3-031-07082-2_18zbMATH Open1502.81028arXiv2205.11034OpenAlexW4281493252MaRDI QIDQ2170100FDOQ2170100
Authors: Fuyuki Kitagawa, Ryo Nishimaki
Publication date: 30 August 2022
Abstract: We initiate the study of software watermarking against quantum adversaries. A quantum adversary generates a quantum state as a pirate software that potentially removes an embedded message from a classical marked software. Extracting an embedded message from quantum pirate software is difficult since measurement could irreversibly alter the quantum state. In this work, we define secure watermarking PRFs for quantum adversaries (unremovability against quantum adversaries). We also present two watermarking PRFs as follows. - We construct a privately extractable watermarking PRF against quantum adversaries from the quantum hardness of the learning with errors (LWE) problem. The marking and extraction algorithms use a public parameter and a private extraction key, respectively. The watermarking PRF is unremovable even if adversaries have (the public parameter and) access to the extraction oracle, which returns a result of extraction for a queried quantum circuit. - We construct a publicly extractable watermarking PRF against quantum adversaries from indistinguishability obfuscation (IO) and the quantum hardness of the LWE problem. The marking and extraction algorithms use a public parameter and a public extraction key, respectively. The watermarking PRF is unremovable even if adversaries have the extraction key (and the public parameter). We develop a quantum extraction technique to extract information (a classical string) from a quantum state without destroying the state too much. We also introduce the notion of extraction-less watermarking PRFs as a crucial building block to achieve the results above by combining the tool with our quantum extraction technique.
Full work available at URL: https://arxiv.org/abs/2205.11034
Recommendations
- A quantum watermark protocol
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- A quantum watermarking scheme using simple and small-scale quantum circuits
- Watermarking public-key cryptographic primitives
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- Collusion resistant watermarkable PRFs from standard assumptions
- Quantum watermarking scheme based on INEQR
- A quantum watermarking protocol based on Bell dual basis
- Constraining and watermarking PRFs from milder assumptions
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
Cryptography (94A60) Quantum computation (81P68) Quantum measurement theory, state operations, state preparations (81P15) Quantum state spaces, operational and probabilistic concepts (81P16) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Secure identity-based encryption in the quantum random oracle model
- Zero-knowledge against quantum attacks
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Random oracles in a quantum world
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- On the (im)possibility of obfuscating programs
- Quantum proofs of knowledge
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries
- From Weak to Strong Watermarking
- Title not available (Why is that?)
- How to watermark cryptographic functions
- Constraining Pseudorandom Functions Privately
- Watermarking PRFs from lattices: stronger security via extractable PRFs
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)
- Secure software leasing
- How to record quantum queries, and applications to quantum indifferentiability
- Watermarking Cryptographic Capabilities
- Collusion resistant watermarkable PRFs from standard assumptions
- Collusion resistant watermarking schemes for cryptographic functionalities
- Watermarking public-key cryptographic primitives
- Schrödinger's pirate: how to trace a quantum decoder
- New approaches for quantum copy-protection
- Secure software leasing from standard assumptions
- Watermarking cryptographic functionalities from standard lattice assumptions
Cited In (6)
- Public key encryption with secure key leasing
- Collusion resistant copy-protection for watermarkable functionalities
- Tracing quantum state distinguishers via backtracking
- Obfuscation of pseudo-deterministic quantum circuits
- Watermarking PRFs and PKE against quantum adversaries
- One-out-of-many unclonable cryptography: definitions, constructions, and more
This page was built for publication: Watermarking PRFs against quantum adversaries
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170100)