Secure identity-based encryption in the quantum random oracle model
نویسندگان
چکیده
منابع مشابه
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that requires no additional assumptions. Our techniques are quite general and we use them to obtain security proofs for two random oracle hierarchical identity-based encryption schemes and a random oracle signature schem...
متن کاملCCA-Secure Hierarchical Identity Based Encryption Without Random Oracle
We consider the problem of constructing a HIBE protocol which is secure in the full model against chosen ciphertext attacks without using random oracle. Known techniques (generic as well as non-generic) convert an (h + 1)-level CPA-secure HIBE protocol into an h-level CCA-secure HIBE protocol. Applied to known constructions, these result in an h-level CCA-secure HIBE whose security degradation ...
متن کاملSimulation-Based Secure Functional Encryption in the Random Oracle Model
One of the main lines of research in functional encryption (FE) has consisted in studying the security notions for FE and their achievability. This study was initiated by [Boneh et al. – TCC’11, O’Neill – ePrint’10] where it was first shown that for FE the indistinguishabilitybased (IND) security notion is not sufficient in the sense that there are FE schemes that are provably IND-Secure but co...
متن کاملSecure Identity Based Encryption Without Random Oracles
We present a fully secure Identity Based Encryption scheme whose proof of security does not rely on the random oracle heuristic. Security is based on the Decision Bilinear Diffie-Hellman assumption. This solves an open problem posed by Boneh and Franklin in 2001.
متن کاملEfficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle
Hierarchical identity-based broadcast encryption (HIBBE) organizes the users in a tree-like structure in which they can delegate the decryption ability to their subordinates. In addition, the trusted third party (TTP) can reduce its burden because the users’ secret keys can be generated in a distributed mechanism by users’ supervisors. HIBBE enables encrypting a message for any arbitrary set of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Quantum Information
سال: 2015
ISSN: 0219-7499,1793-6918
DOI: 10.1142/s0219749915500148