Quantum security proofs using semi-classical oracles

From MaRDI portal
Publication:2304985

DOI10.1007/978-3-030-26951-7_10OpenAlexW2966909207MaRDI QIDQ2304985

Dominique Unruh, Andris Ambainis, Mike Hamburg

Publication date: 9 March 2020

Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_10




Related Items (37)

Impossibility of quantum virtual black-box obfuscation of classical circuitsA Note on the Instantiability of the Quantum Random OracleEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityOnline-extractability in the quantum random-oracle modelTighter proofs of CCA security in the quantum random oracle modelPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelA thorough treatment of highly-efficient NTRU instantiationsA lightweight identification protocol based on latticesCertified everlasting zero-knowledge proof for QMAAn injectivity analysis of Crystals-Kyber and implications on quantum securityImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMGroup action key encapsulation and non-interactive key exchange in the QROMIND-CCA security of Kyber in the quantum random oracle model, revisitedOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelQuantum encryption with certified deletion, revisited: public key, attribute-based, and classical communicationTight adaptive reprogramming in the QROMSponge-based authenticated encryption: security against quantum attackersFailing gracefully: decryption failures and the Fujisaki-Okamoto transformA new framework for quantum oblivious transferOn the post-quantum security of classical authenticated encryption schemesTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelA detailed analysis of Fiat-Shamir with abortsCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsScalable ciphertext compression techniques for post-quantum KEMs and their applicationsPost-quantum verification of Fujisaki-OkamotoPost-quantum resettably-sound zero knowledgeUnifying presampling via concentration boundsQuantum key-length extensionRelationships between quantum IND-CPA notionsBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTighter security proofs for GPV-IBE in the quantum random oracle modelMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityGeneric authenticated key exchange in the quantum random oracle modelQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model






This page was built for publication: Quantum security proofs using semi-classical oracles