Secure identity-based encryption in the quantum random oracle model

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Scopus citations

Abstract

We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that requires no additional assumptions. Our techniques are quite general and we use them to obtain security proofs for two random oracle hierarchical identity-based encryption schemes and a random oracle signature scheme, all of which have previously resisted quantum security proofs, even using additional assumptions. We also explain how to remove the extra assumptions from prior quantum random oracle model proofs. We accomplish these results by developing new tools for arguing that quantum algorithms cannot distinguish between two oracle distributions. Using a particular class of oracle distributions, so called semi-constant distributions, we argue that the aforementioned cryptosystems are secure against quantum adversaries.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings
Pages758-775
Number of pages18
DOIs
StatePublished - Sep 3 2012
Externally publishedYes
Event32nd Annual International Cryptology Conference, CRYPTO 2012 - Santa Barbara, CA, United States
Duration: Aug 19 2012Aug 23 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7417 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other32nd Annual International Cryptology Conference, CRYPTO 2012
CountryUnited States
CitySanta Barbara, CA
Period8/19/128/23/12

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Keywords

  • IBE
  • Quantum
  • Random Oracle
  • Signatures

Fingerprint Dive into the research topics of 'Secure identity-based encryption in the quantum random oracle model'. Together they form a unique fingerprint.

Cite this