Unclonable encryption, introduced by Broadbent and Lord (TQC'20), is an encryption scheme with the following attractive feature: given a ciphertext, an adversary cannot create two ciphertexts both of which decrypt to the same message as the original ciphertext. We revisit this notion and show the following: - Reusability: The constructions proposed by Broadbent and Lord have the disadvantage that they either guarantee one-time security (that is, the encryption key can only be used once to encrypt the message) in the plain model or they guaranteed security in the random oracle model. We construct unclonable encryption schemes with semantic security. We present two constructions (for public-key and private-key settings) from minimal cryptographic assumptions. - Lower Bound and Generalized Construction: We revisit the information-theoretic one-time secure construction of Broadbent and Lord. The success probability of the adversary in their construction was guaranteed to be $0.85^n$, where $n$ is the length of the message. It was interesting to understand whether the ideal success probability of (negligibly close to) $0.5^n$ was unattainable. We generalize their construction to be based on a broader class of monogamy of entanglement games. We demonstrate a simple cloning attack that succeeds with probability $0.71^n$ against a class of schemes including that of Broadbent and Lord. We also present a $0.75^n$ cloning attack exclusively against their scheme. - Implication to Copy-Protection: We show that unclonable encryption, satisfying a stronger property, called unclonable-indistinguishability (defined by Broadbent and Lord), implies copy-protection for a simple class of unlearnable functions. While we currently don't have encryption schemes satisfying this stronger property, this implication demonstrates a new path to construct copy-protection.
翻译:由 Bloadbent 和 Lord (TQC'20) 推出的不加密是一个加密方案,具有以下吸引人的特性: 有了密码文本, 对手无法创建两个密码文本, 两者都与原始密码文本混为一文。 我们重新审视这个概念并显示如下: - 可复制性: 由Broadbent and Lord 和Lord 提议的构造有以下缺点: 它们要么保证一次性安全( 加密密钥只能用于加密电文), 或者它们保证随机或加速模型的安全。 我们用语法安全来构建不易加密的加密游戏。 我们从最小加密假设中提出两种( 用于公用钥匙和私用钥匙设置的) 。 更低调和通用构建: 我们重新审视信息理论的一次性安全性构建。 对手的成功概率被保证为 0.85美元, 美元是无法复制的信息的长度。 我们很想知道的是, 如何用更简单的方式构建一个更精确的游戏, 也显示我们更接近一个普通的游戏的成功概率。