Tighter proofs of CCA security in the quantum random oracle model

From MaRDI portal
Publication:2175932

DOI10.1007/978-3-030-36033-7_3zbMath1455.94126OpenAlexW2954955800MaRDI QIDQ2175932

Nina Bindel, Kathrin Hövelmanns, Mike Hamburg, Andreas Hülsing, Edoardo Persichetti

Publication date: 30 April 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-36033-7_3




Related Items (28)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityPost-quantum security of the Even-Mansour cipherOn IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3Online-extractability in the quantum random-oracle modelPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelA lightweight identification protocol based on latticesAn injectivity analysis of Crystals-Kyber and implications on quantum securityImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextGroup action key encapsulation and non-interactive key exchange in the QROMIND-CCA security of Kyber in the quantum random oracle model, revisitedOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelTight adaptive reprogramming in the QROMFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesSponge-based authenticated encryption: security against quantum attackersFailing gracefully: decryption failures and the Fujisaki-Okamoto transformTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsScalable ciphertext compression techniques for post-quantum KEMs and their applicationsQuantum key-length extensionTighter security proofs for GPV-IBE in the quantum random oracle modelMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityGeneric authenticated key exchange in the quantum random oracle modelQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelOn the integer polynomial learning with errors problem



Cites Work




This page was built for publication: Tighter proofs of CCA security in the quantum random oracle model