Skip to main content
Log in

IND-secure quantum symmetric encryption based on point obfuscation

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum cryptography has developed some fundamental primitives on encryption of quantum data, such as quantum one-time pad and quantum IND (indistinguishability)-security. Compared with other terms in quantum cryptography, quantum obfuscation attracts less attention and is still in its infancy due to its difficulty in implementation and application. In this paper, we define a quantum point function, construct its obfuscation and then demonstrate the validity of applying quantum point obfuscation to quantum symmetric encryption scheme. We rigorously prove that IND-secure quantum symmetric encryption can be realized by quantum point obfuscators. Furthermore, with the properties of combinability or auxiliary inputs, a quantum point obfuscator can implement IND-CPA (indistinguishability under chosen plaintext attack)-secure quantum symmetric encryption or leakage-resilient quantum symmetric encryption, respectively. This work presents new usage of a quantum obfuscator and will complement the theory of quantum obfuscation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ambainis, A., Mosca, M., Tapp, A., Wolf, R.D.: Private quantum channels. In: Proceedings of the 41st Annual IEEE Symposium on Foundations of Computer Science, pp. 547–553 (2000)

  2. Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low T-gate complexity. In: Proceedings of Advances in Cryptology-CRYPTO 2015, pp. 609–629 (2015)

    Google Scholar 

  3. Desrosiers, S.P., Dupuis, F.: Quantum entropic security and approximate quantum encryption. IEEE Trans. Inf. Theory 56(7), 3455–3464 (2010)

    Article  MathSciNet  Google Scholar 

  4. Dan, B., Özgür, D., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. Comput. Sci. 7073(1), 41–69 (2010)

    MathSciNet  MATH  Google Scholar 

  5. Shang, T., Lei, Q., Liu, J.: Quantum random oracle model for quantum digital signature. Phys. Rev. A 94(4), 042314 (2016)

    Article  ADS  Google Scholar 

  6. Alagic, G., Broadbent, A., Fefferman, B., Gagliardoni, T., Schaffner, C., Jules, M.St.: Computational security of quantum encryption. In: Proceedings of International Conference on Information Theoretic Security, pp. 47–71 (2016)

  7. Alagic, G., Majenz, C.: Quantum non-malleability and authentication. In: Proceedings of International Conference on Information Theoretic Security, pp. 310–341 (2017)

  8. Alagic, G., Gagliardoni, T., Majenz, C.: Unforgeable Quantum Encryption (2017). arXiv:1709.06539

  9. Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. Proc. Adv. Cryptol. CRYPTO 2001, 1–18 (2001)

    MathSciNet  MATH  Google Scholar 

  10. Hada, S.: Zero-knowledge and code obfuscation. Proc. Adv. Cryptol. ASIACRYPT 2000, 443–457 (2000)

    MathSciNet  MATH  Google Scholar 

  11. Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: Proceedings of the 46th Annual IEEE Symposium on the Foundations of Computer Science, pp. 553–562 (2005)

  12. Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. Proc. Adv. Cryptol. EUROCRYPT 2004, 20–39 (2004)

    MathSciNet  MATH  Google Scholar 

  13. Ran, C., Kalai, Y.T., Varia, M., et al.: On symmetric encryption and point obfuscation. Lect. Notes Comput. Sci. 79(4), 52–71 (2010)

    MathSciNet  MATH  Google Scholar 

  14. Alagic, G., Fefferman, B.: On quantum obfuscation (2016). arXiv preprint arXiv:1602.01771

  15. Shang, T., Chen, R., Liu, J.: On the obfuscatability of quantum point functions. Quantum Inf. Process. 18(2), 55 (2019)

    Article  ADS  MathSciNet  Google Scholar 

Download references

Acknowledgements

This project was supported by the National Natural Science Foundation of China (No. 61571024) and the National Key Research and Development Program of China (No. 2016YFC1000307) for valuable helps.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Shang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, R., Shang, T. & Liu, J. IND-secure quantum symmetric encryption based on point obfuscation. Quantum Inf Process 18, 161 (2019). https://doi.org/10.1007/s11128-019-2280-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-019-2280-z

Keywords

Navigation