Cryptography with Certified Deletion *Presented Virtually

Published on ● Video Link: https://www.youtube.com/watch?v=wJC_igyDAHE



Duration: 46:11
185 views
3


Dakshita Khurana (University of Illinois Urbana-Champaign)
https://simons.berkeley.edu/talks/dakshita-khurana-university-illinois-urbana-champaign-2023-05-05
Minimal Complexity Assumptions for Cryptography

Quantum information unlocks access to new cryptographic capabilities that are impossible to realize with classical information alone. This talk will focus on the task of certified deletion of encrypted secrets. This enables a party holding an encoding of a secret to certify that the secret has been information-theoretically deleted, and cannot be recovered in the future, even if the underlying key is leaked, or mathematical problems from which the encryption scheme derives security become easy to solve.

I will give an overview of methods to compile vanilla cryptosystems including public-key encryption, attribute-based encryption, witness encryption, fully homomorphic encryption, obfuscation, and functional encryption into their counterparts allowing certified deletion. I will also describe some recent progress towards ensuring that certificates of deletion can be publicly verified, based on weak cryptographic assumptions.

This talk is based on a sequence of works, the first joint with James Bartusek, the second with James Bartusek, Sanjam Garg, Vipul Goyal, Giulio Malavolta, Justin Raizes and Bhaskar Roberts, the third with James Bartusek and Alexander Poremba, and the fourth with James Bartusek, Giulio Malavolta, Alexander Poremba and Michael Walter.




Other Videos By Simons Institute for the Theory of Computing


2023-05-23Fairness without Imputation: A Decision Tree Approach for Fair Prediction with Missing Values
2023-05-23Secure Distributed Matrix Multiplication
2023-05-23On the Robustness to Misspecification of α-Posteriors and Their Variational Approximations
2023-05-23Majorizing Measures, Codes, and Information
2023-05-22KEYNOTE: A (Con)Sequential View of Information for Statistical Learning and Optimization
2023-05-06Black-Box Separations in Quantum Cryptography *Presented Virtually
2023-05-06Quantum pseudorandomness in Algorithmica, and its implications to cryptography and complexity
2023-05-06On the Computational Hardness Needed for Quantum Cryptography
2023-05-06Commitments to Quantum States
2023-05-06Quantum Minimalism
2023-05-05Cryptography with Certified Deletion *Presented Virtually
2023-05-05Black-Hole Radiation Decoding as a Cryptographic Assumption
2023-05-05Geometry of Secure Computation
2023-05-05Collision-Resistance from Multi-Collision-Resistance
2023-05-05New Ways to Garble Arithmetic Circuits
2023-05-05Unclonable Polymers and Their Cryptographic Applications
2023-05-05Batch Proofs are Statistically Hiding
2023-05-05Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography
2023-05-04Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
2023-05-04Assumptions in cryptography and complexity theory
2023-05-04Mutual Empowerment Between Circuit Obfuscation and Circuit Minimization



Tags:
Simons Institute
theoretical computer science
UC Berkeley
Computer Science
Theory of Computation
Theory of Computing
Minimal Complexity Assumptions for Cryptography
Dakshita Khurana