Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501)
From MaRDI portal
scientific article; zbMATH DE number 7331354
Language | Label | Description | Also known as |
---|---|---|---|
English | Tighter security proofs for GPV-IBE in the quantum random oracle model |
scientific article; zbMATH DE number 7331354 |
Statements
Tighter security proofs for GPV-IBE in the quantum random oracle model (English)
0 references
7 April 2021
0 references
This paper presents in essence two tighter proofs -- one in the single-challenge and one in the multi-challenge setting. For the single-challenge setting the authors provide a much tighter proof compared to results of \textit{M. Zhandry} [Lect. Notes Comput. Sci. 7417, 758--775 (2012; Zbl 1296.94147)]. Furthermore, the proof requires little knowledge on quantum computing. The key idea is similar to the public key encryption scheme by \textit{R. Cramer} and \textit{V. Shoup} [ibid. 1462, 13--25 (1998; Zbl 0931.94018)]. The authors simulate in a way so that one can create exactly one secret key for every identity. For the multi-challenge setting the authors provide an almost tight proof. This is interesting, because GPV-IBE was not known to have a tight reduction in this setting (regardless of considering the ROM or QROM). They construct an extended LWE instance (consisting of a public matrix A and a set of vectors) and show that this construction is tightly secure with the same efficiency as the single-challenge setting if the extended LWE instance is provided to the reduction algorithm of the challenge. The key idea is to used the ``lossy mode'' of the LWE problem. Interestingly, the main results presented in this paper also carry over naturally to the ring setting, i.e., R-LWE. Further, they explain how to extend the scheme to a multi-bit message variant while maintaining efficiency and tight-security. The paper is clearly written and sound. The arguments are very clear and all concepts are explained in necessary detail. The paper discusses related work properly and develops the theory stepwise. Even readers with little knowledge on the topic in particular quantum computation should be able to work this paper through.
0 references
identity-based encryption
0 references
quantum random oracle models
0 references
LWE assumption
0 references
tight security reduction
0 references
multi-challenge security
0 references
0 references
0 references
0 references
0 references
0 references
0 references
0 references
0 references
0 references