Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication
نویسندگان
چکیده
Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive called encryption with certified deletion. In this primitive, receiver in possession of ciphertext can generate classical certificate that the encrypted message is deleted. Although their construction information-theoretically secure, it limited to setting one-time symmetric key (SKE), where sender have share common advance be used only once. Moreover, has state send over channel construction. deletion certificates are privately verifiable, which means verification for kept secret, definition by Islam, we also consider public verifiability. work, present various constructions - Quantum communication case: We achieve (reusable-key) (PKE) attribute-based (ABE) Our PKE scheme constructed assuming existence IND-CPA secure PKE, our ABE indistinguishability obfuscation one-way function. These two schemes verifiable. Classical uses communication. give schemes, verifiable one publicly one. The former LWE assumption random oracle model. latter one-shot signatures extractable witness encryption.
منابع مشابه
Quantum Key-Policy Attribute-Based Encryption
Attribute-Based Encryption is a relatively new concept in the field of cryptography, and it allows only the authorized entities to decrypt a message. This type of encryption is the mechanism by which the users may encrypt and decrypt data based on user attributes. This paper proposes the first quantum alternative of the scheme Key-Policy Attribute Based Encryption, where the information, the en...
متن کاملPublic Key Encryption with Keyword Search Revisited
The public key encryption with keyword search (PEKS) scheme recently proposed by Boneh, Di Crescenzo, Ostrovsky, and Persiano enables one to search encrypted keywords without compromising the security of the original data. In this paper, we address three important issues of a PEKS scheme, “refreshing keywords”, “removing secure channel”, and “processing multiple keywords”, which have not been c...
متن کاملCertified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registration process. The flexible syntax afforded by certified encryption suggests that identity-based and certificateless encryption schemes can be analyzed using the models for certified encryption. In this paper we explore...
متن کاملAttribute-Based Encryption with Key Cloning Protection
In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attributebased encryption, that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. We formalize the security requirements for such a scheme in t...
متن کاملAttribute-Based Key-Insulated Encryption
Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-92062-3_21