2021
DOI: 10.1007/978-3-030-92062-3_21
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…One reason why the applications are limited is that in cryptography it is not natural to consider the case when the receiver receives the private key later. Hiroka et al [HMNY21] recently extended the symmetric-key scheme by Broadbent and Islam [BI20] to a public-key encryption scheme, an attribute-based encryption scheme, and a publicly verifiable scheme, which have opened many applications. However, one disadvantage is that their security is the computational one unlike the symmetric-key scheme [BI20].…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…One reason why the applications are limited is that in cryptography it is not natural to consider the case when the receiver receives the private key later. Hiroka et al [HMNY21] recently extended the symmetric-key scheme by Broadbent and Islam [BI20] to a public-key encryption scheme, an attribute-based encryption scheme, and a publicly verifiable scheme, which have opened many applications. However, one disadvantage is that their security is the computational one unlike the symmetric-key scheme [BI20].…”
Section: Our Resultsmentioning
confidence: 99%
“…Therefore, we have to somehow delete the information of sk from the commitment in some hybrid game in a security proof. A similar issue was dealt with by Hiroka et al [HMNY21] by using receiver non-committing encryption in the context of public key encryption with certified deletion. However, their technique inherently relies on the assumption that an adversary runs in polynomial-time even after the deletion.…”
Section: Technical Overviewmentioning
confidence: 85%
See 1 more Smart Citation
“…The notion of certified deletion proposed by Broadbent and Islam is information-theoretic and does not take computational assumptions into account. Subsequently, Hiroka, Morimae, Nishimaki and Yamakawa [HMNY21b] were able to extend the scheme in [BI20] to publickey and attribute-based encryption by using a hybrid encryption scheme in combination with receiver noncommitting (RNC) encryption [JL00,CFGN96] and noisy trapdoor claw-free (NTCF) functions, which were first introduced in [BCM + 21] in the context of certifiable randomness. The encryption schemes proposed by Hiroka, Morimae, Nishimaki and Yamakawa [HMNY21b] enjoy very strong security guarantees at the expense of functionality; in particular, none of the constructions are known to support computations on encrypted data.…”
Section: Related Workmentioning
confidence: 99%
“…This cryptographic notion can be seen as an extension of fully homomorphic encryption schemes [RAD78,Gen09,BV11] which allow for arbitrary computations over encrypted data. Prior work on certified deletion makes use of very specific encryption schemes that seem incompatible with such a functionality; for example, the private-key encryption scheme of Broadbent and Islam [BI20] requires a classical one-time pad, whereas the authors in [HMNY21b] use a particular hybrid encryption scheme in the context of public-key cryptography. While homomorphic encryption enables a wide range of applications including private queries to a search engine and private machine learning on encrypted data [BPTG14], a fundamental limitation remains: once the protocol is complete, the cloud server is still in possession of the client's encrypted data.…”
Section: Introductionmentioning
confidence: 99%