Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501)

From MaRDI portal





scientific article; zbMATH DE number 7331354
Language Label Description Also known as
default for all languages
No label defined
    English
    Tighter security proofs for GPV-IBE in the quantum random oracle model
    scientific article; zbMATH DE number 7331354

      Statements

      Tighter security proofs for GPV-IBE in the quantum random oracle model (English)
      0 references
      0 references
      0 references
      0 references
      7 April 2021
      0 references
      This paper presents in essence two tighter proofs -- one in the single-challenge and one in the multi-challenge setting. For the single-challenge setting the authors provide a much tighter proof compared to results of \textit{M. Zhandry} [Lect. Notes Comput. Sci. 7417, 758--775 (2012; Zbl 1296.94147)]. Furthermore, the proof requires little knowledge on quantum computing. The key idea is similar to the public key encryption scheme by \textit{R. Cramer} and \textit{V. Shoup} [ibid. 1462, 13--25 (1998; Zbl 0931.94018)]. The authors simulate in a way so that one can create exactly one secret key for every identity. For the multi-challenge setting the authors provide an almost tight proof. This is interesting, because GPV-IBE was not known to have a tight reduction in this setting (regardless of considering the ROM or QROM). They construct an extended LWE instance (consisting of a public matrix A and a set of vectors) and show that this construction is tightly secure with the same efficiency as the single-challenge setting if the extended LWE instance is provided to the reduction algorithm of the challenge. The key idea is to used the ``lossy mode'' of the LWE problem. Interestingly, the main results presented in this paper also carry over naturally to the ring setting, i.e., R-LWE. Further, they explain how to extend the scheme to a multi-bit message variant while maintaining efficiency and tight-security. The paper is clearly written and sound. The arguments are very clear and all concepts are explained in necessary detail. The paper discusses related work properly and develops the theory stepwise. Even readers with little knowledge on the topic in particular quantum computation should be able to work this paper through.
      0 references
      0 references
      identity-based encryption
      0 references
      quantum random oracle models
      0 references
      LWE assumption
      0 references
      tight security reduction
      0 references
      multi-challenge security
      0 references
      0 references
      0 references
      0 references
      0 references
      0 references

      Identifiers