2012
DOI: 10.1007/978-3-642-32009-5_44
|View full text |Cite
|
Sign up to set email alerts
|

Secure Identity-Based Encryption in the Quantum Random Oracle Model

Abstract: We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that requires no additional assumptions. Our techniques are quite general and we use them to obtain security proofs for two random oracle hierarchical identity-based encryption schemes and a random oracle signature scheme, all of which have previously resisted quantum security proofs, even using additional assumptions. We also explain h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
61
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 131 publications
(68 citation statements)
references
References 33 publications
0
61
0
Order By: Relevance
“…If q = 0, then this theorem is trivial, since the c classical outputs A sees are distributed randomly. If c = 0, then the theorem reduces to that of Zhandry [Zha12a]. By adapting the proof of the c = 0 case to the general case, we get the lemma.…”
Section: Sufficient Conditions For a One-time Macmentioning
confidence: 88%
See 1 more Smart Citation
“…If q = 0, then this theorem is trivial, since the c classical outputs A sees are distributed randomly. If c = 0, then the theorem reduces to that of Zhandry [Zha12a]. By adapting the proof of the c = 0 case to the general case, we get the lemma.…”
Section: Sufficient Conditions For a One-time Macmentioning
confidence: 88%
“…We first generalize a theorem of Zhandry [Zha12a] Proof. The complete proof is given in the full version [BZ13].…”
Section: Sufficient Conditions For a One-time Macmentioning
confidence: 99%
“…Even more, the techniques involved are often closely related to proof techniques in post-quantum cryptography. For example, bounds for the quantum query complexity of finding collisions in random functions [Zha15a], as well as more general functions [EU17, BES17], were developed from techniques for proving security in the quantum random oracle model [BDF + 11, Zha12,TU16]. Similarly, the lower bounds in this work build on techniques for proving quantum indifferentiability [Zha18].…”
Section: Motivationmentioning
confidence: 99%
“…The main idea of the proof is that, since the random oracle G has the same domain and range, it is indistinguishable from a random permutation [38], thus it can be replaced by an efficiently invertible function which is indistinguishable from a random oracle (for example, a random polynomial of high enough degree [37]). This allows the hashes in the proof to be inverted Algorithm 1 Prover: P OE on input (x, w) // Create t · c proofs and hash each response for i = 1 to t do…”
Section: Unruh's Constructionmentioning
confidence: 99%