Public Key Encryption with Secure Key Leasing
نویسندگان
چکیده
We introduce the notion of public key encryption with secure leasing (PKE-SKL). Our supports decryption keys so that a leased achieves functionality but comes guarantee if quantum returned by user passes validity test, then has lost ability to decrypt. is similar in spirit software (SSL) introduced Ananth and La Placa (Eurocrypt 2021) captures significantly more general adversarial strategies. (In detail, our adversary not restricted use an honest evaluation algorithm run pirated software.) results can be summarized as follows: Prior work, single decryptor (SDE) been studied context PKE (Georgiou Zhandry, Eprint 2020) FE (Kitigawa Nishimaki, Asiacrypt 2022) all their constructions rely on strong assumptions including indistinguishability obfuscation. In contrast, do require any additional assumptions, showing PKE/IBE/ABE/FE upgraded support for free.
منابع مشابه
a cca2-secure incomparable public key encryption scheme
in 2003, waters, felten and sahai introduced a novel cryptographic primitive called incomparable public key cryptosystem to protect anonymity of message receivers in an untrusted network. in this setting, a receiver is allowed to create many anonymous identities for himself without divulging the fact that all these identities refer to the same receiver. recently, lee and lim improved the soluti...
متن کاملPublic-key Encryption with Masking Public-key Encryption with Masking
Timed-release encryption, first mentioned by May [12] and discussed by Rivest, Shamir, and Wanger [15], is a cryptographic primitive which enables us to “send a message into the future.” We take a simple approach, called public-key encryption with masking, in order to realize this requirement. In our model, the sender first encrypts a plaintext and “masks” the ciphertext, then send it the recei...
متن کاملTightly Secure Signatures and Public-Key Encryption
We construct the first public-key encryption scheme whose chosen-ciphertext (i.e., IND-CCA) security can be proved under a standard assumption and does not degrade in either the number of users or the number of ciphertexts. In particular, our scheme can be safely deployed in settings in which no a-priori bound on the number of encryptions and/or users is known. As a central technical building b...
متن کاملSecure Certificateless Public Key Encryption without Redundancy
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present the first secure certificateless public key encryption (CLPKE) scheme without redundancy. Our construction provides optimal bandwidth and quite efficient decryption process compared with the e...
متن کاملAdaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret data of alreadycorrupted parties. Ideally, an adaptively-secure encryption scheme should, like standard public-key encryption, allow arbitrarily-many parties to use a single encryption key to securely encrypt arbitra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-30545-0_20