Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption

📅 2025-10-06
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing secure key leasing (SKL) schemes primarily resist only single-key leakage and fail to withstand multi-user collusion attacks; moreover, they lack support for functionalities beyond decryption—such as pseudorandom functions (PRFs) and digital signatures. To address these limitations, this work introduces the first collusion-resistant, quantum-safe SKL framework based solely on standard assumptions (Learning With Errors and one-way functions). Our approach features a novel Multi-Level Traitor Tracing (MLTT) mechanism and a verifiable key deletion protocol that guarantees the physical erasure of leased keys. We construct the first bounded collusion-resistant PRF key leasing scheme and provide a generic compiler enabling extension to diverse cryptographic primitives—including digital signatures. The framework further achieves query resilience and strong security guarantees. Collectively, our results establish a rigorous theoretical foundation and a practical construction paradigm for deployable key leasing systems.

Technology Category

Application Category

📝 Abstract
Secure key leasing (SKL) enables the holder of a secret key for a cryptographic function to temporarily lease the key using quantum information. Later, the recipient can produce a deletion certificate, which proves that they no longer have access to the secret key. The security guarantee ensures that even a malicious recipient cannot continue to evaluate the function, after producing a valid deletion certificate. Most prior work considers an adversarial recipient that obtains a single leased key, which is insufficient for many applications. In the more realistic collusion-resistant setting, security must hold even when polynomially many keys are leased (and subsequently deleted). However, achieving collusion-resistant SKL from standard assumptions remains poorly understood, especially for functionalities beyond decryption. We improve upon this situation by introducing new pathways for constructing collusion-resistant SKL. Our main contributions are as follows: - A generalization of quantum-secure collusion-resistant traitor tracing called multi-level traitor tracing (MLTT), and a compiler that transforms an MLTT scheme for a primitive X into a collusion-resistant SKL scheme for primitive X. - The first bounded collusion-resistant SKL scheme for PRFs, assuming LWE. - A compiler that upgrades any single-key secure SKL scheme for digital signatures into one with unbounded collusion-resistance, assuming OWFs. - A compiler that upgrades collusion-resistant SKL schemes with classical certificates to ones having verification-query resilience, assuming OWFs.
Problem

Research questions and friction points this paper is trying to address.

Achieving collusion-resistant secure key leasing beyond decryption functions
Developing quantum-secure key leasing schemes resistant to multiple key compromises
Constructing secure key leasing for advanced cryptographic primitives like PRFs and signatures
Innovation

Methods, ideas, or system contributions that make the work stand out.

Multi-level traitor tracing enables collusion-resistant key leasing
LWE-based PRF scheme achieves bounded collusion-resistant key leasing
OWF-based compiler upgrades signatures to unbounded collusion resistance
🔎 Similar Papers
No similar papers found.
F
Fuyuki Kitagawa
NTT Social Informatics Laboratories, Tokyo, Japan
Ryo Nishimaki
Ryo Nishimaki
NTT Social Informatics Laboratories
cryptography
N
Nikhil Pappu
Portland State University, USA