The bounded quantum storage model aims to achieve security against computationally unbounded adversaries that are restricted only with respect to their quantum memories. In this work, we provide the following contributions in this model: 1) We build one-time programs and utilize them to construct CCA1-secure symmetric key encryption and message authentication codes. These schemes require no quantum memory from honest users, yet they provide information-theoretic security against adversaries with arbitrarily large quantum memories, as long as the transmission length is suitably large. 2) We introduce the notion of k-time program broadcast which is a form of program encryption that allows multiple users to each learn a single evaluation of the encrypted program, while preventing any one user from learning more than k evaluations of the program. We build this primitive unconditionally and employ it to construct CCA1-secure asymmetric key encryption, encryption tokens, signatures, and signature tokens. All these schemes are information-theoretically secure against adversaries with roughly e^√m quantum memory where m is the quantum memory required for the honest user. All of the constructions additionally satisfy disappearing security, essentially preventing an adversary from storing and using a transmission later on.
@InProceedings{barhoush_et_al:LIPIcs.ITC.2025.2, author = {Barhoush, Mohammed and Salvail, Louis}, title = {{Powerful Primitives in the Bounded Quantum Storage Model}}, booktitle = {6th Conference on Information-Theoretic Cryptography (ITC 2025)}, pages = {2:1--2:20}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-385-0}, ISSN = {1868-8969}, year = {2025}, volume = {343}, editor = {Gilboa, Niv}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2025.2}, URN = {urn:nbn:de:0030-drops-243523}, doi = {10.4230/LIPIcs.ITC.2025.2}, annote = {Keywords: Quantum Cryptography, Bounded Quantum Storage Model, Information-Theoretic Security} }
Feedback for Dagstuhl Publishing