Random Oracles in a Quantum World
From MaRDI portal
Publication:3102175
DOI10.1007/978-3-642-25385-0_3zbMath1227.94033arXiv1008.0931OpenAlexW1480477462MaRDI QIDQ3102175
Özgür Dagdelen, Christian Schaffner, Mark Zhandry, Anja Lehmann, Dan Boneh, Marc Fischlin
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1008.0931
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (only showing first 100 items - show all)
On tight quantum security of HMAC and NMAC in the quantum random oracle model ⋮ Memory-Tight Reductions for Practical Key Encapsulation Mechanisms ⋮ A Note on the Instantiability of the Quantum Random Oracle ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states ⋮ Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms ⋮ One-time traceable ring signatures ⋮ \textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature scheme ⋮ Security analysis of DGM and GM group signature schemes instantiated with XMSS-T ⋮ Tightly secure ring-LWE based key encapsulation with short ciphertexts ⋮ \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} ⋮ Anonymous, robust post-quantum public key encryption ⋮ Watermarking PRFs against quantum adversaries ⋮ Anonymity of NIST PQC round 3 KEMs ⋮ Online-extractability in the quantum random-oracle model ⋮ Post-quantum Security of Plain OAEP Transform ⋮ Succinct arguments in the quantum random oracle model ⋮ Delegating quantum computation in the quantum random oracle model ⋮ Tighter proofs of CCA security in the quantum random oracle model ⋮ More efficient construction of anonymous signatures ⋮ Computational Security of Quantum Encryption ⋮ Classical and quantum security of elliptic curve VRF, via relative indifferentiability ⋮ Multi-instance secure public-key encryption ⋮ Post-quantum anonymity of Kyber ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ A lightweight identification protocol based on lattices ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Complete analysis of Simon's quantum algorithm with additional collisions ⋮ Certified everlasting zero-knowledge proof for QMA ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ Efficient NIZKs and signatures from commit-and-open protocols in the QROM ⋮ Code-Based Signature Schemes from Identification Protocols in the Rank Metric ⋮ An injectivity analysis of Crystals-Kyber and implications on quantum security ⋮ Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ A note on the post-quantum security of (ring) signatures ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ Nostradamus goes quantum ⋮ Non-uniformity and quantum advice in the quantum random oracle model ⋮ Black-box separations for non-interactive classical commitments in a quantum world ⋮ Formal verification of Saber's public-key encryption scheme in easycrypt ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Redeeming reset indifferentiability and applications to post-quantum security ⋮ Quantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NP ⋮ Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication ⋮ Tight adaptive reprogramming in the QROM ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ A new lattice-based online/offline signatures framework for low-power devices ⋮ A multi-valued quantum fully homomorphic encryption scheme ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Constructive post-quantum reductions ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Lifting standard model reductions to common setup assumptions ⋮ Post-quantum insecurity from LWE ⋮ Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF ⋮ The parallel reversible pebbling game: analyzing the post-quantum security of iMHFs ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Post-quantum verification of Fujisaki-Okamoto ⋮ Quantum cryptography beyond quantum key distribution ⋮ Post-quantum resettably-sound zero knowledge ⋮ Unifying presampling via concentration bounds ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ A note on quantum related-key attacks ⋮ Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives ⋮ Public key compression for constrained linear signature schemes ⋮ Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting ⋮ The lattice-based digital signature scheme qTESLA ⋮ On the obfuscatability of quantum point functions ⋮ Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images ⋮ Leighton-Micali hash-based signatures in the quantum random-oracle model ⋮ Supersingular Isogeny-based Cryptography: A Survey ⋮ Traceable ring signatures: general framework and post-quantum security ⋮ Extended security arguments for signature schemes ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ \textsc{Fractal}: post-quantum and transparent recursive proofs from holography ⋮ Signatures from sequential-OR proofs ⋮ Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ Threshold ring signatures: new definitions and post-quantum security ⋮ Tight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signatures ⋮ Classical vs quantum random oracles ⋮ On the compressed-oracle technique, and post-quantum security of proofs of sequential work ⋮ QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model ⋮ Banquet: short and fast signatures from AES ⋮ Round-optimal verifiable oblivious pseudorandom functions from ideal lattices ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ Semantic Security and Indistinguishability in the Quantum World ⋮ Quantum Hardness of Learning Shallow Classical Circuits ⋮ A Practical Multivariate Blind Signature Scheme ⋮ IND-secure quantum symmetric encryption based on point obfuscation ⋮ Quantum zero correlation linear cryptanalysis ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions ⋮ The ``Quantum annoying property of password-authenticated key exchange protocols ⋮ Quantum indistinguishability for public key encryption ⋮ Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound ⋮ On security notions for encryption in a quantum world
This page was built for publication: Random Oracles in a Quantum World