Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

نویسندگان

چکیده

Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive called encryption with certified deletion. In this primitive, receiver in possession of ciphertext can generate classical certificate that the encrypted message is deleted. Although their construction information-theoretically secure, it limited to setting one-time symmetric key (SKE), where sender have share common advance be used only once. Moreover, has state send over channel construction. deletion certificates are privately verifiable, which means verification for kept secret, definition by Islam, we also consider public verifiability. work, present various constructions - Quantum communication case: We achieve (reusable-key) (PKE) attribute-based (ABE) Our PKE scheme constructed assuming existence IND-CPA secure PKE, our ABE indistinguishability obfuscation one-way function. These two schemes verifiable. Classical uses communication. give schemes, verifiable one publicly one. The former LWE assumption random oracle model. latter one-shot signatures extractable witness encryption.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Key-Policy Attribute-Based Encryption

Attribute-Based Encryption is a relatively new concept in the field of cryptography, and it allows only the authorized entities to decrypt a message. This type of encryption is the mechanism by which the users may encrypt and decrypt data based on user attributes. This paper proposes the first quantum alternative of the scheme Key-Policy Attribute Based Encryption, where the information, the en...

متن کامل

Public Key Encryption with Keyword Search Revisited

The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...

متن کامل

Certified Encryption Revisited

The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...

متن کامل

Attribute-Based Encryption with Key Cloning Protection

In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attributebased encryption, that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. We formalize the security requirements for such a scheme in t...

متن کامل

Attribute-Based Key-Insulated Encryption

Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-92062-3_21