# Certified Everlasting Functional Encryption

@article{Hiroka2022CertifiedEF, title={Certified Everlasting Functional Encryption}, author={Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, journal={IACR Cryptol. ePrint Arch.}, year={2022}, volume={2022}, pages={969} }

Computational security in cryptography has a risk that computational assumptions underlying the security are broken in the future. One solution is to construct information-theoretically-secure protocols, but many cryptographic primitives are known to be impossible (or unlikely) to have information-theoretical security even in the quantum world. A nice compromise (intrinsic to quantum) is certified everlasting security, which roughly means the following. A receiver with possession of quantum…

## One Citation

### Cryptography with Certified Deletion

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2022

A new, unifying framework that yields an array of cryptographic primitives that enable a party in possession of a quantum ciphertext to generate a classical certiﬁcate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources is proposed.

## References

SHOWING 1-10 OF 91 REFERENCES

### Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2021

This work presents various constructions of encryption with certified deletion, a major update version of the paper by Nishimaki and Yamakawa with many new results.

### Cryptography with Certified Deletion

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2022

A new, unifying framework that yields an array of cryptographic primitives that enable a party in possession of a quantum ciphertext to generate a classical certiﬁcate that the encrypted plaintext has been information-theoretically deleted, and cannot be recovered even given unbounded computational resources is proposed.

### Quantum encryption with certified deletion

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020

It is shown that it is possible to encrypt classical data into a quantum ciphertext such that the recipient of the ciphertext can produce a classical string which proves to the originator that the recipients has relinquished any chance of recovering the plaintext should the decryption key be revealed.

### Functional Encryption: Definitions and Challenges

- Computer Science, MathematicsTCC
- 2011

This work shows how to map many existing concepts to the formalization of functional encryption and concludes with several interesting open problems in this young area.

### Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2018

This paper says FE is selectively or adaptively secure when target messages are chosen at the beginning or after function queries are sent, respectively, and single-key/collusion-resistant when it is secure against adversaries that are given only-one/polynomially-many functional decryption keys.

### Revocable Quantum Timed-Release Encryption

- Computer Science, MathematicsJ. ACM
- 2013

It is shown that revocable timed-release encryption without trusted parties is possible using quantum cryptography (while trivially impossible classically) and two proof techniques in the quantum random oracle model are developed.

### Functional Encryption with Bounded Collusions via Multi-party Computation

- Computer Science, MathematicsCRYPTO
- 2012

These constructions require only semantically secure public-key encryption schemes and pseudorandom generators computable by small-depth circuits known to be implied by most concrete intractability assumptions, and are secure under a strong simulation-based definition of functional encryption.

### Composably secure device-independent encryption with certified deletion.

- Computer Science, Mathematics
- 2020

It is shown that it is possible to achieve this task even when the honest parties do not trust their quantum devices, and security for the ECD task is defined in a composable manner and the protocol satisfies conditions that lead to composable security.

### Unconditionally secure quantum bit commitment is impossible

- Computer Science, Mathematics
- 1997

It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.

### Quantum Proofs of Deletion for Learning with Errors

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2022

This work augments the proof-of-deletion paradigm with fully homomorphic encryption (FHE) and introduces an encoding based on Gaussian coset states which is highly generic and suggests that essentially any LWE-based cryptographic primitive admits a classically-verifiable quantum proof of deletion.