Secure identity-based encryption in the quantum random oracle model

被引:20
|
作者
Zhandry, Mark [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
关键词
Quantum; random oracle; IBE; signatures; SET;
D O I
10.1142/S0219749915500148
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give the first proof of security for an identity-based encryption (IBE) scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that does not rely on the assumed existence of so-called quantum-secure pseudorandom functions (PRFs). Our techniques are quite general and we use them to obtain security proofs for two random oracle hierarchical IBE schemes and a random oracle signature scheme, all of which have previously resisted quantum security proofs, even assuming quantum-secure PRFs. We also explain how to remove quantum-secure PRFs from prior quantum random oracle model proofs. We accomplish these results by developing new tools for arguing that quantum algorithms cannot distinguish between two oracle distributions. Using a particular class of oracle distributions that we call semi-constant distributions, we argue that the aforementioned cryptosystems are secure against quantum adversaries.
引用
收藏
页数:31
相关论文
共 50 条
  • [1] Secure Identity-Based Encryption in the Quantum Random Oracle Model
    Zhandry, Mark
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 758 - 775
  • [2] Secure and practical identity-based encryption
    Naccache, D.
    [J]. IET INFORMATION SECURITY, 2007, 1 (02) : 59 - 64
  • [3] Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme
    Karati, Arijit
    Biswas, G. P.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4060 - 4074
  • [4] Tightly Secure Hierarchical Identity-Based Encryption
    Langrehr, Roman
    Pan, Jiaxin
    [J]. JOURNAL OF CRYPTOLOGY, 2020, 33 (04) : 1787 - 1821
  • [5] On use of identity-based encryption for secure emailing
    Veigner, Christian
    Rong, Chunming
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 289 - +
  • [6] Secure AIS with Identity-Based Authentication and Encryption
    Goudosis, A.
    Katsikas, S. K.
    [J]. TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2020, 14 (02) : 287 - 298
  • [7] Tightly Secure Hierarchical Identity-Based Encryption
    Roman Langrehr
    Jiaxin Pan
    [J]. Journal of Cryptology, 2020, 33 : 1787 - 1821
  • [8] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [9] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [10] Simulation-Based Secure Functional Encryption in the Random Oracle Model
    Iovino, Vincenzo
    Zebroski, Karol
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 21 - 39