How to record quantum queries, and applications to quantum indifferentiability
From MaRDI portal
Publication:2304984
DOI10.1007/978-3-030-26951-7_9OpenAlexW2968763694MaRDI QIDQ2304984
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_9
Quantum computation (81P68) Cryptography (94A60) Semiclassical techniques, including WKB and Maslov methods applied to problems in quantum theory (81Q20) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25) Mathematical modeling or simulation for problems pertaining to quantum theory (81-10)
Related Items (53)
On tight quantum security of HMAC and NMAC in the quantum random oracle model ⋮ A Note on the Instantiability of the Quantum Random Oracle ⋮ Collapseability of Tree Hashes ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ A note on quantum collision resistance of double-block-length compression functions ⋮ Post-quantum security of the Even-Mansour cipher ⋮ Watermarking PRFs against quantum adversaries ⋮ Anonymity of NIST PQC round 3 KEMs ⋮ On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 ⋮ Online-extractability in the quantum random-oracle model ⋮ Post-quantum Security of Plain OAEP Transform ⋮ Succinct arguments in the quantum random oracle model ⋮ Tighter proofs of CCA security in the quantum random oracle model ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ Classical and quantum security of elliptic curve VRF, via relative indifferentiability ⋮ Post-quantum anonymity of Kyber ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ Certified everlasting zero-knowledge proof for QMA ⋮ On the impossibility of key agreements from quantum random oracles ⋮ Efficient NIZKs and signatures from commit-and-open protocols in the QROM ⋮ The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ Full quantum equivalence of group action DLog and CDH, and more ⋮ Black-box separations for non-interactive classical commitments in a quantum world ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Redeeming reset indifferentiability and applications to post-quantum security ⋮ Tight adaptive reprogramming in the QROM ⋮ QCB: efficient quantum-secure authenticated encryption ⋮ New constructions of collapsing hashes ⋮ Constructive post-quantum reductions ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Post-quantum plaintext-awareness ⋮ Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF ⋮ On security notions for encryption in a quantum world ⋮ Failing gracefully: decryption failures and the Fujisaki-Okamoto transform ⋮ A new framework for quantum oblivious transfer ⋮ On the post-quantum security of classical authenticated encryption schemes ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model ⋮ Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium ⋮ Machine-checked security for XMSS as in RFC 8391 and SPHINCS\textsuperscript{+} ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Unifying presampling via concentration bounds ⋮ Quantum key-length extension ⋮ Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security ⋮ Efficient simulation of random states and random unitaries ⋮ Quantum-access-secure message authentication via blind-unforgeability ⋮ Classical vs quantum random oracles ⋮ On the compressed-oracle technique, and post-quantum security of proofs of sequential work ⋮ Scalable pseudorandom quantum states
This page was built for publication: How to record quantum queries, and applications to quantum indifferentiability