Abstract
The powerful no-cloning principle of quantum mechanics can be leveraged to achieve interesting primitives, referred to as unclonable primitives, that are impossible to achieve classically. In the past few years, we have witnessed a surge of new unclonable primitives. While prior works have mainly focused on establishing feasibility results, another equally important direction, that of understanding the relationship between different unclonable primitives is still in its nascent stages. Moving forward, we need a more systematic study of unclonable primitives.
To this end, we introduce a new framework called cloning games. This framework captures many fundamental unclonable primitives such as quantum money, copy-protection, unclonable encryption, single-decryptor encryption, and many more. By reasoning about different types of cloning games, we obtain many interesting implications to unclonable cryptography, including the following:
-
1.
We obtain the first construction of information-theoretically secure single-decryptor encryption in the one-time setting.
-
2.
We construct unclonable encryption in the quantum random oracle model based on BB84 states, improving upon the previous work, which used coset states. Our work also provides a simpler security proof for the previous work.
-
3.
We construct copy-protection for single-bit point functions in the quantum random oracle model based on BB84 states, improving upon the previous work, which used coset states, and additionally, providing a simpler proof.
-
4.
We establish a relationship between different challenge distributions of copy-protection schemes and single-decryptor encryption schemes.
-
5.
Finally, we present a new construction of one-time encryption with certified deletion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
We note that the security in the literature is stated slightly differently. \(\mathcal {A}\) is given encryption of a message \(m_b\), where b is picked uniformly at random and \(\mathcal {B},\mathcal {C}\) are expected to simultaneously guess b. We note that this formulation is identical to the above formulation.
- 3.
- 4.
We only consider classes of unlearnable functions which are functions that cannot be efficiently learned from its input and output behavior. Copy-protection for learnable functions is impossible.
- 5.
As far as we know, all unclonable primitives can be cast as cloning games by making reasonable minor modifications to the framework.
- 6.
- 7.
In contrast, unclonability allows \(\mathcal {B}\) and \(\mathcal {C}\) to both learn the secret key before passing verification. Note that we use the word “weaker” qualitatively in this sentence, and do not claim that unclonability implies the existence of certified deletion in general.
- 8.
Although this is not true for the initial definition we use to introduce cloning games, deletion games are captured after considering a natural extension of cloning games, where \(\mathcal {B}\) and \(\mathcal {C}\) are not treated symmetrically.
- 9.
Please refer to the definition of unclonability of an unclonable encryption scheme in the introduction.
- 10.
Our theorem is more general than what is stated here; refer to the full version for more details.
- 11.
One example of trivial success probability being large is non-local decision games, where \(\mathcal {B}\) and \(\mathcal {C}\) try to produce binary answers simultaneously.
- 12.
There can be multiple eigenvectors with the same eigenvalues. In the overview, we assume that eigenvalues are unique.
- 13.
There is a one-to-one mapping between \(\{|\phi _p\rangle ,\{|\psi _q\rangle \}\) and the vectors \(\{|\psi ^\mathcal {B}_i\rangle ,\{|\psi ^\mathcal {C}_j\rangle \}\) defined in the Jordan’s lemma.
- 14.
Unlike our result on single-decryptor encryption, which asks for the usual, stronger property of unclonability, here we do not need the simultaneous version of the Goldreich-Levin Lemma because we are in the weaker, certified deletion setting.
- 15.
A simplified version of it without additional properties. The authors show in [BI20] that the construction already satisfies the stronger notion of unclonable indistinguishable security, yet the proof is more involved.
- 16.
This is in order to simplify the notation for the rest of the algorithms. We will sometimes make this inclusion explicit, and other times it is understood implicitly.
- 17.
We assume statistical correctness here.
- 18.
Here we make the natural assumption that correctness and security are defined with respect to the same distribution \(\mathcal {D}'_f\). Intuitively, the scheme should protect against cloning the functionality of the honest evaluator.
- 19.
Note that this captures the average-input correctness as opposed to per-input correctness.
- 20.
- 21.
We omit the message distribution due to the lack of message.
- 22.
This requirement can be lifted by extending the definition of stateful cloning games and having \(\widetilde{\textsf{GenC}}\) know the random coins of \(\textsf{GenT}'\) (in this case m). We keep the syntax simple for there is no known application to the more general case.
References
Aaronson, S.: Quantum copy-protection and quantum money. In: 2009 24th Annual IEEE Conference on Computational Complexity, pp. 229–242. IEEE (2009) (cit. on pp. 2, 3)
Adcock, M., Cleve, R.: A quantum Goldreich-Levin theorem with cryptographic applications. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, pp. 323–334. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45841-7_26 (cit. on p. 22)
Aaronson, S., Christiano, P.: Quantum money from hidden subspaces. In: Proceedings of the Forty-Fourth Annual ACM Symposium on Theory of Computing (STOC 2012). Association for Computing Machinery, New York (2012), pp. 41–60. https://doi.org/10.1145/2213977.2213983. ISBN:9781450312455 (cit. on pp. 2, 5, 28, 29)
Ananth, P. Kaleoglu, F. Unclonable ecryption, revisited. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 299–329. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_11 (cit. on pp. 3, 5, 8, 27)
Ananth, P., Kaleoglu, F., Li, X., Liu, Q., Zhandry, M.: On the feasibility of unclonable encryption, and more. In: Dodis, Y., Shrimpton, T. (eds.). Advances in Cryptology – CRYPTO 2022, pp. 212–241. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15979-4_8. ISBN:978-3-031-15979-4 (cit. on pp. 3, 5-8, 20-22, 27)
Ananth, P., La Placa, R.L..: Secure software leasing. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 501–530. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77886-6_17 (cit. on p. 2)
Aaronson, S., Liu, J., Liu, Q., Zhandry, M., Zhang, R.: New approaches for quantum copy-protection. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology - CRYPTO 2021, pp. 526–555. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_19. ISBN:978-3-030-84242-0 (cit. on pp. 2, 8)
Ananth, P., Qian, L., Yuen, H.: Cryptography from pseudorandom quantum states. In: Annual International Cryptology Conference, pp. 208–236. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_8 (cit. on p. 5)
Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing, vol. 560, pp. 175–179 (1984). https://doi.org/10.1016/j.tcs.2011.08.039 (cit. on p. 5)
Bitansky, N., Brakerski, Z., Kalai, Y.T.: Constructive post-quantum reductions. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology – CRYPTO 2022. Springer, Cham (2022), pp. 654–683. https://doi.org/10.1007/978-3-031-15982-4_22. ISBN:978-3-031-15982-4 (cit. on pp. 15, 23)
Brakerski, Z., Canetti, R., Qian, L.: On the computational hardness needed for quantum cryptography. arXiv preprint arXiv:2209.04101 (2022) (cit. on p. 5)
Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 41–69. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25385-0_3 (cit. on p. 20)
Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 344–360. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40084-1_20 (cit. on p. 2)
Broadbent, A., Islam, R.: Quantum encryption with certified deletion. In: Pass, R., Pietrzak, K. (eds.) TCC 2020. LNCS, vol. 12552, pp. 92–122. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64381-2_4 (cit. on pp. 2, 5, 9, 22)
Broadbent, A., Jeffery, S., Lord, S., Podder, S., Sundaram, A.: Secure software leasing without assumptions. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 90–120. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_4 (cit. on pp. 2, 6, 27)
Bartusek, J., Khurana, D.: Cryptography with Certified Deletion (2022). https://doi.org/10.48550/ARXIV.2207.01754 (cit. on pp. 9, 22)
Broadbent, A., Lord, S.: Uncloneable quantum encryption via oracles. In: Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2020). https://doi.org/10.4230/LIPICS.TQC.2020.4 (cit. on pp. 2, 5, 8, 20, 22, 27)
Ben-David, S., Sattath, O.: Quantum Tokens for Digital Signatures (2016). https://doi.org/10.48550/ARXIV.1609.09047 (cit. on p. 2)
Coladangelo, A., Liu, J., Liu, Q., Zhandry, M.: Hidden cosets and applications to unclonable cryptography. In: Malkin, T., Peikert, C. (eds.) CRYPTO 2021. LNCS, vol. 12825, pp. 556–584. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-84242-0_20 (cit. on pp. 2, 4, 5, 7, 8, 22)
Coladangelo, A., Majenz, C., Poremba, A.: Quantum copy-protection of compute-and-compare programs in the quantum random oracle model (2020). 13865. https://doi.org/10.48550/ARXIV.2009 (cit. on pp. 3, 5, 6, 8, 27)
Chiesa, A., Ma, F., Spooner, N., Zhandry, M.: Post-quantum succinct arguments: breaking the quantum rewinding barrier. In: 62nd FOCS, pp. 49–58. IEEE Computer Society (2022). (cit. on pp. 16–18)
Culf, E., Vidick, T.: A monogamy-of-entanglement game for subspace coset states. arXiv preprint arXiv:2107.13324 [cs.CR] (2021) (cit. on p. 22)
DGBJ Dieks. Communication by EPR devices. Phys. Lett. A 92(6), 271–272 (1982) (cit. on p. 2)
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, Seattle (STOC 1989), pp. 25–32. Association for Computing Machinery (1989). https://doi.org/10.1145/73007.73010. ISBN:0897913078 (cit. on pp. 6, 13)
Gottesman, D.: Uncloneable Encryption (2002). https://doi.org/10.48550/ARXIV.QUANT-PH/0210062 (cit. on p. 2)
Georgiou, M., Zhandry, M.: Unclonable decryption keys. In: IACR Cryptol. ePrint Arch (2020), p. 877 (cit. on pp. 4, 7, 28)
Hiroka, T., Morimae, T., Nishimaki, R., Yamakawa, T.: Certified everlasting zero-knowledge proof for QMA. In: Annual International Cryptology Conference, pp. 239–268. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_9(cit. on p. 2)
Impagliazzo, R.: A personal view of average-case complexity. In: Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference, pp. 134–147. IEEE (1995) (cit. on p. 5)
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 8–26. Springer, New York (1990). https://doi.org/10.1007/0-387-34799-2_2 (cit. on p. 5)
Jordan, C.: Essai sur la géométrie à n dimensions fre. In: Bulletin de la Société Mathématique de France 3, pp. 103–174 (1875) (cit. on p. 17)
Kitagawa, F. Nishimaki, R. Yamakawa, T. Secure software leasing from standard assumptions. In: Nissim, K., Waters, B. (eds.) TCC 2021. LNCS, vol. 13042, pp. 31–61. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90459-3_2 (cit. on p. 2)
Morimae, T., Yamakawa, T.: Quantum commitments and signatures without one-way functions. In: Annual International Cryptology Conference, pp. 269–295. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15802-5_10 (cit. on p. 5)
Shmueli, O.: Public-key Quantum money with a classical bank. In: Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, pp. 790–803 (2022) (cit. on p. 2)
Sattath, O., Wyborski, S.: Uncloneable decryption from quantum copy protection. arXiv preprint arXiv:2203.05866 (2022) (cit. on p. 5)
Tomamichel, M., Fehr, S., Kaniewski, J.d., Wehner, S.: A monogamy-of-entanglement game with applications to device-independent quantum cryptography. New J. Phys. 15(10), 103002 (2013). https://doi.org/10.1088/1367-2630/15/10/103002 (cit. on pp. 8, 9, 22)
Vidick, T., Zhang, T.: Classical proofs of quantum knowledge. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12697, pp. 630–660. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77886-6_22 (cit. on p. 5)
Wiesner, S.: Conjugate coding. ACM Sigact News 15(1), 78–88 (1983) (cit. on pp. 2, 5, 28)
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), pp. 802–803 (1982) (cit. on p. 2)
Zhandry, M.: Quantum lightning never strikes the same state twice. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 408–438. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17659-4_14 (cit. on pp. 2, 5, 28)
Acknowledgements
PA and FK are supported by a gift from Cisco.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 International Association for Cryptologic Research
About this paper
Cite this paper
Ananth, P., Kaleoglu, F., Liu, Q. (2023). Cloning Games: A General Framework for Unclonable Primitives. In: Handschuh, H., Lysyanskaya, A. (eds) Advances in Cryptology – CRYPTO 2023. CRYPTO 2023. Lecture Notes in Computer Science, vol 14085. Springer, Cham. https://doi.org/10.1007/978-3-031-38554-4_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-38554-4_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-38553-7
Online ISBN: 978-3-031-38554-4
eBook Packages: Computer ScienceComputer Science (R0)