2020
DOI: 10.1007/978-3-030-64381-2_4
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Encryption with Certified Deletion

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
88
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(88 citation statements)
references
References 32 publications
0
88
0
Order By: Relevance
“…In the next step, an adversary in the new game that we described in the last paragraph, is reduced to an adversary against a Quantum Encryption with Certified Deletion scheme. In a Quantum Encryption with Certified Deletion (QECD) scheme ( [BI20], see also Definition 18), a user can provide proof of deletion for a quantum cipher-text such that the proof can be verified using a separate algorithm. The security guarantee is that if the adversary submits a proof of deletion for a cipher-text that passes verification, then she could not learn the message later, even if she is provided with the secret key.…”
Section: Proof Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…In the next step, an adversary in the new game that we described in the last paragraph, is reduced to an adversary against a Quantum Encryption with Certified Deletion scheme. In a Quantum Encryption with Certified Deletion (QECD) scheme ( [BI20], see also Definition 18), a user can provide proof of deletion for a quantum cipher-text such that the proof can be verified using a separate algorithm. The security guarantee is that if the adversary submits a proof of deletion for a cipher-text that passes verification, then she could not learn the message later, even if she is provided with the secret key.…”
Section: Proof Techniquesmentioning
confidence: 99%
“…The security guarantee is that if the adversary submits a proof of deletion for a cipher-text that passes verification, then she could not learn the message later, even if she is provided with the secret key. We map any adversary against TMAC in the intermediate game described in the last paragraph to an adversary against a QECD scheme in a weaker security game that is a relaxation of the certified deletion game in [BI20] (see Section 5.2). We should point out that this is a scheme specific reduction and we do not know if it can be made generic.…”
Section: Proof Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Our work and that of [GGV20] assume honest behaviour of the data collector. Unless the data collector has a quantum memory [BI20], this assumption is necessary when modelling compliance to data deletion request. We stress that our notion of deletion-compliance is independent of any notion of privacy, and in particular does not excuse the data collector from respecting the user's privacy.…”
Section: Introductionmentioning
confidence: 99%