2021
DOI: 10.48550/arxiv.2105.05393
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

Taiga Hiroka,
Tomoyuki Morimae,
Ryo Nishimaki
et al.

Abstract: Broadbent and Islam (TCC '20) proposed a quantum cryptographic primitive called quantum encryption with certified deletion. In this primitive, a receiver in possession of a quantum ciphertext can generate a classical certificate that the encrypted message is deleted. Although their construction is information-theoretically secure, it is limited to the setting of one-time symmetric key encryption (SKE), where a sender and receiver have to share a common key in advance and the key can be used only once. Moreover… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…In addition to this line of work focused on rigidity statements, application-specific dequantisations were already considered for private-key quantum money [RS19], certifiable deletion of quantum encryption [HMNY21] and secure software leasing [KNY21]. In all these cases the authors derived the desired security statement from properties of trapdoor claw-free functions, a cryptographic primitive which is also the basis of our RSP protocol.…”
Section: Related Workmentioning
confidence: 99%
“…In addition to this line of work focused on rigidity statements, application-specific dequantisations were already considered for private-key quantum money [RS19], certifiable deletion of quantum encryption [HMNY21] and secure software leasing [KNY21]. In all these cases the authors derived the desired security statement from properties of trapdoor claw-free functions, a cryptographic primitive which is also the basis of our RSP protocol.…”
Section: Related Workmentioning
confidence: 99%
“…A number of followup results also made use of TCFs in this way, allowing for the efficient certification of randomness generation [BCM + 18], remote quantum state preparation [GV19, CCKW19, MV21], device-independent cryptography [MDCAF20], zero-knowledge [VZ20] and others [ACGH20, CCY20, KNY20,HMNY21]. Since all of these protocols require the quantum prover to coherently evaluate the TCFs, which are polynomial-depth classical circuits, the prover must have the ability to perform polynomial-depth quantum circuits.…”
Section: Introductionmentioning
confidence: 99%