2015
DOI: 10.1145/2817206
|View full text |Cite
|
Sign up to set email alerts
|

Revocable Quantum Timed-Release Encryption

Abstract: Timed-release encryption is a kind of encryption scheme in which a recipient can decrypt only after a specified amount of time T (assuming that we have a moderately precise estimate of his computing power). A revocable timed-release encryption is one where, before the time T is over, the sender can "give back" the timed-release encryption, provably loosing all access to the data. We show that revocable timed-release encryption without trusted parties is possible using quantum cryptography (while trivially impo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
48
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(49 citation statements)
references
References 35 publications
1
48
0
Order By: Relevance
“…To prove Theorem 4.2, we are going to use the following lemma of Unruh. [17]). Let H : X → Y be a random oracle.…”
Section: Security Of Prfs Under Random Leakagementioning
confidence: 99%
“…To prove Theorem 4.2, we are going to use the following lemma of Unruh. [17]). Let H : X → Y be a random oracle.…”
Section: Security Of Prfs Under Random Leakagementioning
confidence: 99%
“…1 in such a way that four cipherstates lie in the xz-plane [40], corresponding to linear polarisation. Another physical implementation of qubits is to use pulse trains as in Di↵erential Phase Shift QKD [38], but with di↵erent amplitudes and phases. As topics for future work we mention (i) security proof for the proposed key recycling scheme; (ii) using the moments listed in Table 4 to derive a sharper bound on |⇢ g ⌧ | 1 and max (⇢ g ⌧ ).…”
Section: Discussionmentioning
confidence: 99%
“…From (38) we can derive an expression like Theorem 6.5 for the sufficient key length to obtain a ∞-norm version of ε-privacy; only the constant terms are different.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to consider quantum adversaries and quantum queries, the concept of one-way to hiding (O2H) [9] is introduced in the security proofs.…”
Section: Copyright © 2019 the Institute Of Electronics Information Amentioning
confidence: 99%