Tighter proofs of CCA security in the quantum random oracle model
From MaRDI portal
Publication:2175932
DOI10.1007/978-3-030-36033-7_3zbMath1455.94126OpenAlexW2954955800MaRDI QIDQ2175932
Nina Bindel, Kathrin Hövelmanns, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti
Publication date: 30 April 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-36033-7_3
Related Items (28)
On tight quantum security of HMAC and NMAC in the quantum random oracle model ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ Post-quantum security of the Even-Mansour cipher ⋮ On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 ⋮ Online-extractability in the quantum random-oracle model ⋮ Post-quantum anonymity of Kyber ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ A lightweight identification protocol based on lattices ⋮ An injectivity analysis of Crystals-Kyber and implications on quantum security ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Tight adaptive reprogramming in the QROM ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Failing gracefully: decryption failures and the Fujisaki-Okamoto transform ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Quantum key-length extension ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model ⋮ On the integer polynomial learning with errors problem
Cites Work
- Unnamed Item
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- On the bit security of cryptographic primitives
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Generic authenticated key exchange in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Random Oracles in a Quantum World
- Revocable Quantum Timed-Release Encryption
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - CRYPTO 2003
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
This page was built for publication: Tighter proofs of CCA security in the quantum random oracle model