Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
From MaRDI portal
Publication:6157506
DOI10.1007/978-3-030-92062-3_21zbMath1522.81070arXiv2105.05393MaRDI QIDQ6157506
Ryo Nishimaki, Taiga Hiroka, Tomoyuki Morimae, Takashi Yamakawa
Publication date: 12 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2105.05393
Cryptography (94A60) Communication theory (94A05) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (5)
Certified everlasting zero-knowledge proof for QMA ⋮ Functional encryption with secure key leasing ⋮ Public key encryption with secure key leasing ⋮ Publicly-verifiable deletion via target-collapsing functions ⋮ Cryptography with certified deletion
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Quantum encryption with certified deletion
- Qfactory: classically-instructed remote secret qubits preparation
- Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously
- Quantum security proofs using semi-classical oracles
- Semi-quantum money
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- How to Run Turing Machines on Encrypted Data
- Random Oracles in a Quantum World
- Revocable Quantum Timed-Release Encryption
- A Pseudorandom Generator from any One-way Function
- A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device
- One-shot signatures and applications to hybrid quantum/classical authentication
- Fuzzy Identity-Based Encryption
- On the (im)possibility of obfuscating programs
- Witness encryption and its applications
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication