论文标题
错误的删除量的量子证明错误
Quantum Proofs of Deletion for Learning with Errors
论文作者
论文摘要
量子信息具有测量属性是一个固有的破坏性过程。在互补性的原理中,此特征最为明显,该原则指出,无法同时测量相互不相容的可观察物。 Broadbent和Islam(TCC 2020)的最新工作是基于量子力学的这一方面实现了一个名为认证删除的加密概念的。虽然这个非凡的概念使经典的验证者能够说服一个(私钥)量子密文已被不受信任的政党删除,但它没有提供额外的功能层。 在这项工作中,我们通过完全同构加密(FHE)增强了局部证明范式。我们使用经过认证的删除构建第一个完全同态加密方案 - 一种交互式协议,该协议使不信任的量子服务器能够计算加密数据,并在要求时同时向客户端证明数据删除。我们的计划具有理想的财产,即删除证书的验证是公开的;这意味着任何人都可以验证删除已经发生。我们的主要技术成分是一种交互式协议,通过该协议,量子供者可以通过该协议说服经典的验证者,以删除了以错误形式从学习中删除误差(LWE)分布的样本。作为我们协议的应用,我们使用经过认证的删除构建双重regev公开加密方案,然后将其扩展到同一类型的(平均)FHE方案。我们介绍了高斯 - 碰撞哈希功能的概念 - 一种特殊的崩溃的哈希功能(Eurocrypt 2016)所定义的,我们证明了在存在泄漏处的Ajtai Hash函数时,我们证明了我们计划的安全性。
Quantum information has the property that measurement is an inherently destructive process. This feature is most apparent in the principle of complementarity, which states that mutually incompatible observables cannot be measured at the same time. Recent work by Broadbent and Islam (TCC 2020) builds on this aspect of quantum mechanics to realize a cryptographic notion called certified deletion. While this remarkable notion enables a classical verifier to be convinced that a (private-key) quantum ciphertext has been deleted by an untrusted party, it offers no additional layer of functionality. In this work, we augment the proof-of-deletion paradigm with fully homomorphic encryption (FHE). We construct the first fully homomorphic encryption scheme with certified deletion -- an interactive protocol which enables an untrusted quantum server to compute on encrypted data and, if requested, to simultaneously prove data deletion to a client. Our scheme has the desirable property that verification of a deletion certificate is public; meaning anyone can verify that deletion has taken place. Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors (LWE) distribution in the form of a quantum state was deleted. As an application of our protocol, we construct a Dual-Regev public-key encryption scheme with certified deletion, which we then extend towards a (leveled) FHE scheme of the same type. We introduce the notion of Gaussian-collapsing hash functions -- a special case of collapsing hash functions defined by Unruh (Eurocrypt 2016) -- and we prove the security of our schemes under the assumption that the Ajtai hash function satisfies a certain strong Gaussian-collapsing property in the presence of leakage.