2020
DOI: 10.48550/arxiv.2010.11186
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Secure Software Leasing from Standard Assumptions

Fuyuki Kitagawa,
Ryo Nishimaki,
Takashi Yamakawa

Abstract: Secure software leasing (SSL) is a quantum cryptographic primitive that enables users to execute software only during the software is leased. It prevents users from executing leased software after they return the leased software to its owner. SSL can make software distribution more flexible and controllable.Although SSL is an attractive cryptographic primitive, the existing SSL scheme is based on public key quantum money, which is not instantiated with standard cryptographic assumptions so far. Moreover, the e… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 14 publications
(40 reference statements)
1
5
0
Order By: Relevance
“…This is simply because if somehow we can prepare two copies of this state, then measuring two copies in two bases will yield both 𝑥 and 𝑑. This computational unclonability property has also been observed and used in prior works, in particular in the context of semi-quantum money [RS19] and two-tier quantum lightning [KNY21]. Later we will see that the security proof for our CVPV protocol requires a stronger variant of computational unclonability than the ones considered in these works.…”
Section: Computationally Unclonablesupporting
confidence: 62%
“…This is simply because if somehow we can prepare two copies of this state, then measuring two copies in two bases will yield both 𝑥 and 𝑑. This computational unclonability property has also been observed and used in prior works, in particular in the context of semi-quantum money [RS19] and two-tier quantum lightning [KNY21]. Later we will see that the security proof for our CVPV protocol requires a stronger variant of computational unclonability than the ones considered in these works.…”
Section: Computationally Unclonablesupporting
confidence: 62%
“…First, we observe that this assumption is false for arbitrary R. This attack is implicit in the work of [RZ20,KNY20].…”
Section: Qlwe With R-reduction-friendly Cloning Securitymentioning
confidence: 97%
“…Ideally, we would like to not place any additional restriction on the adversary: for instance, the adversary can get access to cloned copies of their intermediate states at any point during its execution. However, it turns out that such an adversary is too powerful and can in fact break QLWE (such an attack was implicit in the works of [RZ20,KNY20]). However, we place certain restrictions on the behavior of the adversary that will allow us to make the security proof go through.…”
Section: Our Contributionsmentioning
confidence: 99%
“…This implies that a general scheme for quantum copy protection for quantum unlearnable functions is also impossible. More recently, [KNY20] managed to construct SSL schemes for a subclass of the class of evasive functions. They also consider two weaker variants of SSLfinite-term SSL and SSL with classical communicationsand show constructions of such schemes for pseudo-random functions.…”
Section: Quantum Copy Protectionmentioning
confidence: 99%