Editing
Quantum Encryption with Certified Deletion
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
<!-- This is a comment. You can erase them or write below --> <!-- Functionality page describes a general task which can be realised in a quantum network --> <!-- Description: A lucid definition of functionality in discussion.--> ==Functionality== This functionality allows encryption of classical data into a quantum ciphertext so that the recipient of the ciphertext can produce a deletion certificate (a classical string) which proves to the originator that the recipient can no longer obtain the original plaintext should the decryption key be revealed. A Certified Deletion Encryption (CDE) scheme usually consists of the following 5 algorithms: * ''KeyGen:'' This algorithm generates the key used in later stages * ''Enc:'' This algorithm encrypts the classical plaintext into a quantum ciphertext * ''Dec:'' This algorithm decrypts the quantum ciphertext to recover the classical plaintext * ''Del:'' This algorithm deletes the ciphertext and generates a deletion certificate * ''Ver:'' This algorithm verifies the deletion certificate <!-- Tags Any related page or list of protocols is connected by this section--> ==Properties== <!-- All properties that should be satisfied by any protocol achieving the concerned functionality and other common terminologies used in all the protocols.--> * '''Decryption-correctness''': Given the ciphertext and the associated key, the probability that ''Dec'' does not output the correct plaintext is negligible in the security parameter * '''Verification-correctness''': Given a valid deletion certificate and its associated key, the probability that ''Ver'' does not accept the certificate is negligible in the security parameter * '''Certified Deletion Security''': Once the deletion certificate is issued, it becomes impossible to decrypt the certificate, even if the key is later leaked. ==Protocols== <!-- List of different types of example protocol achieving the functionality--> *[[Prepare-and-Measure Certified Deletion]] *[[Public Key Encryption with Certified Deletion]] *[[Attribute-Based Encryption with Certified Deletion]] ==References== * [https://arxiv.org/abs/1910.03551 Broadbent & Islam (2019) ] * [https://arxiv.org/abs/2105.05393 Hiroka et al. (2021)] <div style='text-align: right;'>''*contributed by Chirag Wadhwa''</div>
Summary:
Please note that all contributions to Quantum Protocol Zoo may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Quantum Protocol Zoo:Copyrights
for details).
Do not submit copyrighted work without permission!
To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Search
Navigation
Main page
News
Protocol Library
Certification Library
Nodal Subroutines
Codes Repository
Knowledge Graphs
Submissions
Categories
Supplementary Information
Recent Changes
Contact us
Help
Tools
What links here
Related changes
Special pages
Page information