Skip to main content

Cloning Games: A General Framework for Unclonable Primitives

  • Conference paper
  • First Online:
Advances in Cryptology – CRYPTO 2023 (CRYPTO 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14085))

Included in the following conference series:

  • 1421 Accesses

Abstract

The powerful no-cloning principle of quantum mechanics can be leveraged to achieve interesting primitives, referred to as unclonable primitives, that are impossible to achieve classically. In the past few years, we have witnessed a surge of new unclonable primitives. While prior works have mainly focused on establishing feasibility results, another equally important direction, that of understanding the relationship between different unclonable primitives is still in its nascent stages. Moving forward, we need a more systematic study of unclonable primitives.

To this end, we introduce a new framework called cloning games. This framework captures many fundamental unclonable primitives such as quantum money, copy-protection, unclonable encryption, single-decryptor encryption, and many more. By reasoning about different types of cloning games, we obtain many interesting implications to unclonable cryptography, including the following:

  1. 1.

    We obtain the first construction of information-theoretically secure single-decryptor encryption in the one-time setting.

  2. 2.

    We construct unclonable encryption in the quantum random oracle model based on BB84 states, improving upon the previous work, which used coset states. Our work also provides a simpler security proof for the previous work.

  3. 3.

    We construct copy-protection for single-bit point functions in the quantum random oracle model based on BB84 states, improving upon the previous work, which used coset states, and additionally, providing a simpler proof.

  4. 4.

    We establish a relationship between different challenge distributions of copy-protection schemes and single-decryptor encryption schemes.

  5. 5.

    Finally, we present a new construction of one-time encryption with certified deletion.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    An (impatient) reader familiar with the above primitives could skip directly to Sect. 1.1. We still recommend going through the discussion before reading Sect. 1.1.

  2. 2.

    We note that the security in the literature is stated slightly differently. \(\mathcal {A}\) is given encryption of a message \(m_b\), where b is picked uniformly at random and \(\mathcal {B},\mathcal {C}\) are expected to simultaneously guess b. We note that this formulation is identical to the above formulation.

  3. 3.

    The original formulation by [Aar09] is weaker than what is stated here. We follow the game-based definition by [CMP20].

  4. 4.

    We only consider classes of unlearnable functions which are functions that cannot be efficiently learned from its input and output behavior. Copy-protection for learnable functions is impossible.

  5. 5.

    As far as we know, all unclonable primitives can be cast as cloning games by making reasonable minor modifications to the framework.

  6. 6.

    With the exception of copy-protection of point functions [CMP20, AKL+22].

  7. 7.

    In contrast, unclonability allows \(\mathcal {B}\) and \(\mathcal {C}\) to both learn the secret key before passing verification. Note that we use the word “weaker” qualitatively in this sentence, and do not claim that unclonability implies the existence of certified deletion in general.

  8. 8.

    Although this is not true for the initial definition we use to introduce cloning games, deletion games are captured after considering a natural extension of cloning games, where \(\mathcal {B}\) and \(\mathcal {C}\) are not treated symmetrically.

  9. 9.

    Please refer to the definition of unclonability of an unclonable encryption scheme in the introduction.

  10. 10.

    Our theorem is more general than what is stated here; refer to the full version for more details.

  11. 11.

    One example of trivial success probability being large is non-local decision games, where \(\mathcal {B}\) and \(\mathcal {C}\) try to produce binary answers simultaneously.

  12. 12.

    There can be multiple eigenvectors with the same eigenvalues. In the overview, we assume that eigenvalues are unique.

  13. 13.

    There is a one-to-one mapping between \(\{|\phi _p\rangle ,\{|\psi _q\rangle \}\) and the vectors \(\{|\psi ^\mathcal {B}_i\rangle ,\{|\psi ^\mathcal {C}_j\rangle \}\) defined in the Jordan’s lemma.

  14. 14.

    Unlike our result on single-decryptor encryption, which asks for the usual, stronger property of unclonability, here we do not need the simultaneous version of the Goldreich-Levin Lemma because we are in the weaker, certified deletion setting.

  15. 15.

    A simplified version of it without additional properties. The authors show in [BI20] that the construction already satisfies the stronger notion of unclonable indistinguishable security, yet the proof is more involved.

  16. 16.

    This is in order to simplify the notation for the rest of the algorithms. We will sometimes make this inclusion explicit, and other times it is understood implicitly.

  17. 17.

    We assume statistical correctness here.

  18. 18.

    Here we make the natural assumption that correctness and security are defined with respect to the same distribution \(\mathcal {D}'_f\). Intuitively, the scheme should protect against cloning the functionality of the honest evaluator.

  19. 19.

    Note that this captures the average-input correctness as opposed to per-input correctness.

  20. 20.

    Although (2) was defined in a slightly different way in [BL20], the difference is inconsequential, and our version has been used in follow-up works such as [AKL+22]. We also mention that [BL20] considered perfect correctness.

  21. 21.

    We omit the message distribution due to the lack of message.

  22. 22.

    This requirement can be lifted by extending the definition of stateful cloning games and having \(\widetilde{\textsf{GenC}}\) know the random coins of \(\textsf{GenT}'\) (in this case m). We keep the syntax simple for there is no known application to the more general case.

References

  1. Aaronson, S.: Quantum copy-protection and quantum money. In: 2009 24th Annual IEEE Conference on Computational Complexity, pp. 229–242. IEEE (2009) (cit. on pp. 2, 3)

    Google Scholar 

  2. Adcock, M., Cleve, R.: A quantum Goldreich-Levin theorem with cryptographic applications. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, pp. 323–334. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45841-7_26 (cit. on p. 22)

  3. Aaronson, S., Christiano, P.: Quantum money from hidden subspaces. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing (STOC 2012). Association for Computing Machinery, New York (2012), pp. 41–60. https://doi.org/10.1145/2213977.2213983. ISBN:9781450312455 (cit. on pp. 2, 5, 28, 29)

  4. Ananth, P. Kaleoglu, F. Unclonable ecryption, revisited. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 299–329. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_11 (cit. on pp. 3, 5, 8, 27)

  5. Ananth, P., Kaleoglu, F., Li, X., Liu, Q., Zhandry, M.: On the feasibility of unclonable encryption, and more. In: Dodis, Y., Shrimpton, T. (eds.). Advances in Cryptology – CRYPTO 2022, pp. 212–241. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15979-4_8. ISBN:978-3-031-15979-4 (cit. on pp. 3, 5-8, 20-22, 27)

  6. Ananth, P., La Placa, R.L..: Secure software leasing. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 501–530. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77886-6_17 (cit. on p. 2)

  7. Aaronson, S., Liu, J., Liu, Q., Zhandry, M., Zhang, R.: New approaches for quantum copy-protection. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology - CRYPTO 2021, pp. 526–555. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_19. ISBN:978-3-030-84242-0 (cit. on pp. 2, 8)

  8. Ananth, P., Qian, L., Yuen, H.: Cryptography from pseudorandom quantum states. In: Annual International Cryptology Conference, pp. 208–236. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_8 (cit. on p. 5)

  9. Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing, vol. 560, pp. 175–179 (1984). https://doi.org/10.1016/j.tcs.2011.08.039 (cit. on p. 5)

  10. Bitansky, N., Brakerski, Z., Kalai, Y.T.: Constructive post-quantum reductions. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology – CRYPTO 2022. Springer, Cham (2022), pp. 654–683. https://doi.org/10.1007/978-3-031-15982-4_22. ISBN:978-3-031-15982-4 (cit. on pp. 15, 23)

  11. Brakerski, Z., Canetti, R., Qian, L.: On the computational hardness needed for quantum cryptography. arXiv preprint arXiv:2209.04101 (2022) (cit. on p. 5)

  12. Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 41–69. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_3 (cit. on p. 20)

  13. Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 344–360. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40084-1_20 (cit. on p. 2)

  14. Broadbent, A., Islam, R.: Quantum encryption with certified deletion. In: Pass, R., Pietrzak, K. (eds.) TCC 2020. LNCS, vol. 12552, pp. 92–122. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64381-2_4 (cit. on pp. 2, 5, 9, 22)

  15. Broadbent, A., Jeffery, S., Lord, S., Podder, S., Sundaram, A.: Secure software leasing without assumptions. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 90–120. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_4 (cit. on pp. 2, 6, 27)

  16. Bartusek, J., Khurana, D.: Cryptography with Certified Deletion (2022). https://doi.org/10.48550/ARXIV.2207.01754 (cit. on pp. 9, 22)

  17. Broadbent, A., Lord, S.: Uncloneable quantum encryption via oracles. In: Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2020). https://doi.org/10.4230/LIPICS.TQC.2020.4 (cit. on pp. 2, 5, 8, 20, 22, 27)

  18. Ben-David, S., Sattath, O.: Quantum Tokens for Digital Signatures (2016). https://doi.org/10.48550/ARXIV.1609.09047 (cit. on p. 2)

  19. Coladangelo, A., Liu, J., Liu, Q., Zhandry, M.: Hidden cosets and applications to unclonable cryptography. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 556–584. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_20 (cit. on pp. 2, 4, 5, 7, 8, 22)

  20. Coladangelo, A., Majenz, C., Poremba, A.: Quantum copy-protection of compute-and-compare programs in the quantum random oracle model (2020). 13865. https://doi.org/10.48550/ARXIV.2009 (cit. on pp. 3, 5, 6, 8, 27)

  21. Chiesa, A., Ma, F., Spooner, N., Zhandry, M.: Post-quantum succinct arguments: breaking the quantum rewinding barrier. In: 62nd FOCS, pp. 49–58. IEEE Computer Society (2022). (cit. on pp. 16–18)

    Google Scholar 

  22. Culf, E., Vidick, T.: A monogamy-of-entanglement game for subspace coset states. arXiv preprint arXiv:2107.13324 [cs.CR] (2021) (cit. on p. 22)

  23. DGBJ Dieks. Communication by EPR devices. Phys. Lett. A 92(6), 271–272 (1982) (cit. on p. 2)

    Google Scholar 

  24. Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, Seattle (STOC 1989), pp. 25–32. Association for Computing Machinery (1989). https://doi.org/10.1145/73007.73010. ISBN:0897913078 (cit. on pp. 6, 13)

  25. Gottesman, D.: Uncloneable Encryption (2002). https://doi.org/10.48550/ARXIV.QUANT-PH/0210062 (cit. on p. 2)

  26. Georgiou, M., Zhandry, M.: Unclonable decryption keys. In: IACR Cryptol. ePrint Arch (2020), p. 877 (cit. on pp. 4, 7, 28)

    Google Scholar 

  27. Hiroka, T., Morimae, T., Nishimaki, R., Yamakawa, T.: Certified everlasting zero-knowledge proof for QMA. In: Annual International Cryptology Conference, pp. 239–268. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_9(cit. on p. 2)

  28. Impagliazzo, R.: A personal view of average-case complexity. In: Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference, pp. 134–147. IEEE (1995) (cit. on p. 5)

    Google Scholar 

  29. Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 8–26. Springer, New York (1990). https://doi.org/10.1007/0-387-34799-2_2 (cit. on p. 5)

  30. Jordan, C.: Essai sur la géométrie à n dimensions fre. In: Bulletin de la Société Mathématique de France 3, pp. 103–174 (1875) (cit. on p. 17)

    Google Scholar 

  31. Kitagawa, F. Nishimaki, R. Yamakawa, T. Secure software leasing from standard assumptions. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 31–61. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_2 (cit. on p. 2)

  32. Morimae, T., Yamakawa, T.: Quantum commitments and signatures without one-way functions. In: Annual International Cryptology Conference, pp. 269–295. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_10 (cit. on p. 5)

  33. Shmueli, O.: Public-key Quantum money with a classical bank. In: Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, pp. 790–803 (2022) (cit. on p. 2)

    Google Scholar 

  34. Sattath, O., Wyborski, S.: Uncloneable decryption from quantum copy protection. arXiv preprint arXiv:2203.05866 (2022) (cit. on p. 5)

  35. Tomamichel, M., Fehr, S., Kaniewski, J.d., Wehner, S.: A monogamy-of-entanglement game with applications to device-independent quantum cryptography. New J. Phys. 15(10), 103002 (2013). https://doi.org/10.1088/1367-2630/15/10/103002 (cit. on pp. 8, 9, 22)

  36. Vidick, T., Zhang, T.: Classical proofs of quantum knowledge. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 630–660. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77886-6_22 (cit. on p. 5)

  37. Wiesner, S.: Conjugate coding. ACM Sigact News 15(1), 78–88 (1983) (cit. on pp. 2, 5, 28)

    Google Scholar 

  38. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), pp. 802–803 (1982) (cit. on p. 2)

    Google Scholar 

  39. Zhandry, M.: Quantum lightning never strikes the same state twice. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 408–438. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17659-4_14 (cit. on pp. 2, 5, 28)

Download references

Acknowledgements

PA and FK are supported by a gift from Cisco.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabhanjan Ananth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ananth, P., Kaleoglu, F., Liu, Q. (2023). Cloning Games: A General Framework for Unclonable Primitives. In: Handschuh, H., Lysyanskaya, A. (eds) Advances in Cryptology – CRYPTO 2023. CRYPTO 2023. Lecture Notes in Computer Science, vol 14085. Springer, Cham. https://doi.org/10.1007/978-3-031-38554-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-38554-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-38553-7

  • Online ISBN: 978-3-031-38554-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics