Hybrid Encryption with Certified Deletion in Preprocessing Model
By: Kunal Dey, Reihaneh Safavi-Naini
Potential Business Impact:
Lets you prove a file is truly gone.
Certified deletion allows Alice to outsource data to Bob and, at a later time, obtain a verifiable guarantee that the file has been irreversibly deleted at her request. The functionality, while impossible using classical information alone, can be achieved using quantum information. Existing approaches, rely on one-time pad (OTP) encryption, or use computational hardness assumptions that may be vulnerable to future advances in classical or quantum computing. In this work, we introduce and formalize hybrid encryption with certified deletion in the preprocessing model (pHE-CD) and propose two constructions. The constructions combine an information-theoretic key encapsulation mechanism (iKEM) with a data encapsulation mechanism that provides certified deletion (DEM-CD) and, respectively, provide {\em information-theoretic certified deletion}, where both confidentiality and deletion properties are provided against a computationally unbounded adversary; and {\em everlasting certified deletion}, where confidentiality is computational before deletion, and upon successful verification of the deletion certificate, the message becomes information-theoretically hidden from an adversary that is computationally unbounded. Our pHE-CD schemes provide IND-$q_e$-CPA notion of security and support encryption of arbitrarily long messages. In the second construction, using a computationally secure DEM-CD that is quantum-safe (i.e. constructed using quantum coding and AES), we obtain quantum-safe security with keys that are significantly shorter than the message. Instantiating the proposed framework using quantum enabled kem (qKEM) as the iKEM, is a future work.
Similar Papers
Enhanced Security of Public Key Encryption with Certified Deletion
Cryptography and Security
Makes secret messages truly disappear forever.
Computational Certified Deletion Property of Magic Square Game and its Application to Classical Secure Key Leasing
Cryptography and Security
Lets computers prove secrets were deleted.
QMA Complete Quantum-Enhanced Kyber: Provable Security Through CHSH Nonlocality
Quantum Physics
Secures messages with quantum physics and math.