Anne Broadbent - Secure Software Leasing Without Assumptions
Quantum Computation in Isolation virtual seminar on March 30th, 2021.
Sign up for future email notifications here:
https://groups.google.com/g/quantum-computation-in-isolation
Anne Broadbent, University of Ottawa - Secure Software Leasing Without Assumptions
Abstract:
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas of interest. Given a target circuit C from a circuit class, SSL produces an encoding of C that enables a recipient to evaluate C, and also enables the originator of the software to verify that the software has been returned – meaning that the recipient has relinquished the possibility of any further use of the software. Clearly, such a functionality is unachievable using classical information alone, since it is impossible to prevent a user from keeping a copy of the software. Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare (these are a generalization of the well-known point functions). These prior works, however all make use of setup or computational assumptions. Here, we show that SSL is achievable for compute-and-compare circuits without any assumptions. Our technique involves the study of quantum copy-protection, which is a notion related to SSL, but where the encoding procedure inherently prevents a would-be quantum software pirate from splitting a single copy of an encoding for C into two parts, each of which enables a user to evaluate C. We show that point functions can be copy-protected without any assumptions, for a novel security definition involving one honest and one malicious evaluator; this is achieved by showing that from any quantum message authentication code, we can derive such an honest-malicious copy-protection scheme. We then show that a generic honest-malicious copy-protection scheme implies SSL; by prior work, this yields SSL for compute-and-compare functions.
Based on joint work with Stacey Jeffery, Sebastien Lord, Supartha Podder and Aarthi Sundaram. arXiv:2101.12739
Видео Anne Broadbent - Secure Software Leasing Without Assumptions канала Joshuah Heath
Sign up for future email notifications here:
https://groups.google.com/g/quantum-computation-in-isolation
Anne Broadbent, University of Ottawa - Secure Software Leasing Without Assumptions
Abstract:
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas of interest. Given a target circuit C from a circuit class, SSL produces an encoding of C that enables a recipient to evaluate C, and also enables the originator of the software to verify that the software has been returned – meaning that the recipient has relinquished the possibility of any further use of the software. Clearly, such a functionality is unachievable using classical information alone, since it is impossible to prevent a user from keeping a copy of the software. Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare (these are a generalization of the well-known point functions). These prior works, however all make use of setup or computational assumptions. Here, we show that SSL is achievable for compute-and-compare circuits without any assumptions. Our technique involves the study of quantum copy-protection, which is a notion related to SSL, but where the encoding procedure inherently prevents a would-be quantum software pirate from splitting a single copy of an encoding for C into two parts, each of which enables a user to evaluate C. We show that point functions can be copy-protected without any assumptions, for a novel security definition involving one honest and one malicious evaluator; this is achieved by showing that from any quantum message authentication code, we can derive such an honest-malicious copy-protection scheme. We then show that a generic honest-malicious copy-protection scheme implies SSL; by prior work, this yields SSL for compute-and-compare functions.
Based on joint work with Stacey Jeffery, Sebastien Lord, Supartha Podder and Aarthi Sundaram. arXiv:2101.12739
Видео Anne Broadbent - Secure Software Leasing Without Assumptions канала Joshuah Heath
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Boris Svistunov - Space- and time-crystallization effects in multicomponent superfluids](https://i.ytimg.com/vi/eLZHMwybiKo/default.jpg)
![Hatem Barghathi - Operationally accessible entanglement in Fermionic Fluids](https://i.ytimg.com/vi/FcyLuyKKTLo/default.jpg)
![Mark Wilde - Applying Quantum Information-Theoretic Techniques to Quantum Computational Complexity](https://i.ytimg.com/vi/ZSQjY0qGirI/default.jpg)
![Yiqing Zhou - What Limits the Simulation of Quantum Computers?](https://i.ytimg.com/vi/EZ0XBThab28/default.jpg)
![Andrew Lucas - Viscous fluids of electrons](https://i.ytimg.com/vi/VN2VdvP0m98/default.jpg)
![Jan Zaanen - Quantum thermalization in quantum supreme matter](https://i.ytimg.com/vi/VXaR8V3NOi8/default.jpg)
![Ian Affleck - Emergent Supersymmetry in Condensed Matter Models of Interacting Majorana Fermions](https://i.ytimg.com/vi/ZFTieeBDHy0/default.jpg)
![Sevag Gharibian-How hard is it to simulate local measurements on ground states of many-body systems?](https://i.ytimg.com/vi/i8hLbBpS7Qk/default.jpg)
![Daniel Lidar - Classical Boundaries of Quantum Supremacy](https://i.ytimg.com/vi/pffnPgsOdvA/default.jpg)
![Adrian Del Maestro - Nanoscale confinement towards a one-dimensional superfluid](https://i.ytimg.com/vi/QVZDaKxVEe0/default.jpg)
![Matteo Baggioli - From Hydrodynamics to Viscoelasticity in Holography and beyond...](https://i.ytimg.com/vi/DzuoKddI2FI/default.jpg)
![Subir Sachdev - Excitation spectra of compressible quantum matter without quasiparticles](https://i.ytimg.com/vi/zODjNdq0m30/default.jpg)
![Massimo Boninsegni - Supersolid phases of dipolar bosons](https://i.ytimg.com/vi/miIG-KcvSUU/default.jpg)
![Pramodh Senarath Yapa - Superfluid Helium-3 within the Confines](https://i.ytimg.com/vi/zvf0KdAfLDE/default.jpg)
![Dominic Else - Illuminating the physics of strange metals through general constraints](https://i.ytimg.com/vi/Ysk8JwK4rHY/default.jpg)
![Meng Cheng - Fractionalization in topological quantum spin liquids](https://i.ytimg.com/vi/uP66ywuBqsg/default.jpg)
![David Ceperley - Path integral theory of exchange in quantum crystals](https://i.ytimg.com/vi/jNPdqx-eGRM/default.jpg)
![Thi Ha Kyaw, University of Toronto - Designing quantum hardware with quantum computers](https://i.ytimg.com/vi/PL06TtIWhKY/default.jpg)
![Max Metlitski - Boundary criticality of the O(N) model in d = 3 critically revisited](https://i.ytimg.com/vi/Mh-7Pyhy8jI/default.jpg)
![Kaden Hazzard - SU(N) magnetism in ultracold atoms & structure of correlations in many-body systems](https://i.ytimg.com/vi/XoFNAHVLxVI/default.jpg)