How to record quantum queries, and applications to quantum indifferentiability

From MaRDI portal
Publication:2304984

DOI10.1007/978-3-030-26951-7_9OpenAlexW2968763694MaRDI QIDQ2304984

Mark Zhandry

Publication date: 9 March 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_9




Related Items (53)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelA Note on the Instantiability of the Quantum Random OracleCollapseability of Tree HashesEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsA note on quantum collision resistance of double-block-length compression functionsPost-quantum security of the Even-Mansour cipherWatermarking PRFs against quantum adversariesAnonymity of NIST PQC round 3 KEMsOn IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3Online-extractability in the quantum random-oracle modelPost-quantum Security of Plain OAEP TransformSuccinct arguments in the quantum random oracle modelTighter proofs of CCA security in the quantum random oracle modelGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionClassical and quantum security of elliptic curve VRF, via relative indifferentiabilityPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelCertified everlasting zero-knowledge proof for QMAOn the impossibility of key agreements from quantum random oraclesEfficient NIZKs and signatures from commit-and-open protocols in the QROMThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationIND-CCA security of Kyber in the quantum random oracle model, revisitedFull quantum equivalence of group action DLog and CDH, and moreBlack-box separations for non-interactive classical commitments in a quantum worldOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelRedeeming reset indifferentiability and applications to post-quantum securityTight adaptive reprogramming in the QROMQCB: efficient quantum-secure authenticated encryptionNew constructions of collapsing hashesConstructive post-quantum reductionsSponge-based authenticated encryption: security against quantum attackersPost-quantum plaintext-awarenessAdaptive versus static multi-oracle algorithms, and quantum security of a split-key PRFOn security notions for encryption in a quantum worldFailing gracefully: decryption failures and the Fujisaki-Okamoto transformA new framework for quantum oblivious transferOn the post-quantum security of classical authenticated encryption schemesTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelFixing and mechanizing the security proof of Fiat-Shamir with aborts and DilithiumMachine-checked security for XMSS as in RFC 8391 and SPHINCS\textsuperscript{+}Scalable ciphertext compression techniques for post-quantum KEMs and their applicationsUnifying presampling via concentration boundsQuantum key-length extensionBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesTighter security proofs for GPV-IBE in the quantum random oracle modelMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityEfficient simulation of random states and random unitariesQuantum-access-secure message authentication via blind-unforgeabilityClassical vs quantum random oraclesOn the compressed-oracle technique, and post-quantum security of proofs of sequential workScalable pseudorandom quantum states






This page was built for publication: How to record quantum queries, and applications to quantum indifferentiability