Research Article
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
Table 1
Comparison of Adaptively Secure DIBE Schemes in the Auxiliary-Input Setting.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
shows the size of the master public key. and denote the number of key extraction queries and the advantage of the adversary, respectively. represents a fixed but large polynomial that does not depend and . To measure the reduction cost, we show the advantage of the LWE algorithm constructed from the adversary against the corresponding DIBE scheme. , is the constant satisfying , where is the relative distance of the underlying error correcting code. We can take as close to as one wants. , and are the smallest integers satisfying that and . , is the smallest integer satisfying that . |