Quantum security proofs using semi-classical oracles
From MaRDI portal
Publication:2304985
DOI10.1007/978-3-030-26951-7_10OpenAlexW2966909207MaRDI QIDQ2304985
Dominique Unruh, Andris Ambainis, Mike Hamburg
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_10
provable securitypublic-key encryptionpost-quantum cryptographyquantum random oracle modelone-way to hiding
Cryptography (94A60) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25)
Related Items (37)
Impossibility of quantum virtual black-box obfuscation of classical circuits ⋮ A Note on the Instantiability of the Quantum Random Oracle ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ Online-extractability in the quantum random-oracle model ⋮ Tighter proofs of CCA security in the quantum random oracle model ⋮ Post-quantum anonymity of Kyber ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ A thorough treatment of highly-efficient NTRU instantiations ⋮ A lightweight identification protocol based on lattices ⋮ Certified everlasting zero-knowledge proof for QMA ⋮ An injectivity analysis of Crystals-Kyber and implications on quantum security ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication ⋮ Tight adaptive reprogramming in the QROM ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Failing gracefully: decryption failures and the Fujisaki-Okamoto transform ⋮ A new framework for quantum oblivious transfer ⋮ On the post-quantum security of classical authenticated encryption schemes ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model ⋮ A detailed analysis of Fiat-Shamir with aborts ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Post-quantum verification of Fujisaki-Okamoto ⋮ Post-quantum resettably-sound zero knowledge ⋮ Unifying presampling via concentration bounds ⋮ Quantum key-length extension ⋮ Relationships between quantum IND-CPA notions ⋮ Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives ⋮ Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
This page was built for publication: Quantum security proofs using semi-classical oracles