Random Oracles in a Quantum World

From MaRDI portal
Publication:3102175

DOI10.1007/978-3-642-25385-0_3zbMath1227.94033arXiv1008.0931OpenAlexW1480477462MaRDI QIDQ3102175

Özgür Dagdelen, Christian Schaffner, Mark Zhandry, Anja Lehmann, Dan Boneh, Marc Fischlin

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/1008.0931




Related Items (only showing first 100 items - show all)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelMemory-Tight Reductions for Practical Key Encapsulation MechanismsA Note on the Instantiability of the Quantum Random OracleEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsA hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin statesPost-Quantum Security of the Fujisaki-Okamoto and OAEP TransformsOne-time traceable ring signatures\textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature schemeSecurity analysis of DGM and GM group signature schemes instantiated with XMSS-TTightly secure ring-LWE based key encapsulation with short ciphertexts\textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon}Anonymous, robust post-quantum public key encryptionWatermarking PRFs against quantum adversariesAnonymity of NIST PQC round 3 KEMsOnline-extractability in the quantum random-oracle modelPost-quantum Security of Plain OAEP TransformSuccinct arguments in the quantum random oracle modelDelegating quantum computation in the quantum random oracle modelTighter proofs of CCA security in the quantum random oracle modelMore efficient construction of anonymous signaturesComputational Security of Quantum EncryptionClassical and quantum security of elliptic curve VRF, via relative indifferentiabilityMulti-instance secure public-key encryptionPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelA lightweight identification protocol based on lattices\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionComplete analysis of Simon's quantum algorithm with additional collisionsCertified everlasting zero-knowledge proof for QMAA quantum related-key attack based on the Bernstein-Vazirani algorithmEfficient NIZKs and signatures from commit-and-open protocols in the QROMCode-Based Signature Schemes from Identification Protocols in the Rank MetricAn injectivity analysis of Crystals-Kyber and implications on quantum securityQuantum-resistant password-based threshold single-sign-on authentication with updatable server private keyImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMA note on the post-quantum security of (ring) signaturesGroup action key encapsulation and non-interactive key exchange in the QROMIND-CCA security of Kyber in the quantum random oracle model, revisitedNostradamus goes quantumNon-uniformity and quantum advice in the quantum random oracle modelBlack-box separations for non-interactive classical commitments in a quantum worldFormal verification of Saber's public-key encryption scheme in easycryptOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelRedeeming reset indifferentiability and applications to post-quantum securityQuantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NPQuantum encryption with certified deletion, revisited: public key, attribute-based, and classical communicationTight adaptive reprogramming in the QROMFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesA new lattice-based online/offline signatures framework for low-power devicesA multi-valued quantum fully homomorphic encryption schemeApplications of Simon's algorithm in quantum attacks on Feistel variantsConstructive post-quantum reductionsSponge-based authenticated encryption: security against quantum attackersLifting standard model reductions to common setup assumptionsPost-quantum insecurity from LWEAdaptive versus static multi-oracle algorithms, and quantum security of a split-key PRFThe parallel reversible pebbling game: analyzing the post-quantum security of iMHFsCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsPost-quantum verification of Fujisaki-OkamotoQuantum cryptography beyond quantum key distributionPost-quantum resettably-sound zero knowledgeUnifying presampling via concentration boundsProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldA note on quantum related-key attacksBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesPublic key compression for constrained linear signature schemesTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingThe lattice-based digital signature scheme qTESLAOn the obfuscatability of quantum point functionsQuantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital imagesLeighton-Micali hash-based signatures in the quantum random-oracle modelSupersingular Isogeny-based Cryptography: A SurveyTraceable ring signatures: general framework and post-quantum securityExtended security arguments for signature schemesTighter security proofs for GPV-IBE in the quantum random oracle modelAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity\textsc{Fractal}: post-quantum and transparent recursive proofs from holographySignatures from sequential-OR proofsMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityGeneric authenticated key exchange in the quantum random oracle modelThreshold ring signatures: new definitions and post-quantum securityTight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signaturesClassical vs quantum random oraclesOn the compressed-oracle technique, and post-quantum security of proofs of sequential workQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelBanquet: short and fast signatures from AESRound-optimal verifiable oblivious pseudorandom functions from ideal latticesBreaking Symmetric Cryptosystems Using Quantum Period FindingSemantic Security and Indistinguishability in the Quantum WorldQuantum Hardness of Learning Shallow Classical CircuitsA Practical Multivariate Blind Signature SchemeIND-secure quantum symmetric encryption based on point obfuscationQuantum zero correlation linear cryptanalysisQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functionsThe ``Quantum annoying property of password-authenticated key exchange protocolsQuantum indistinguishability for public key encryptionFinding hash collisions with quantum computers by using differential trails with smaller probability than birthday boundOn security notions for encryption in a quantum world




This page was built for publication: Random Oracles in a Quantum World