Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
From MaRDI portal
Publication:3181027
DOI10.1007/978-3-662-53644-5_8zbMath1397.94103OpenAlexW2407452345MaRDI QIDQ3181027
Ehsan Ebrahimi Targhi, Dominique Unruh
Publication date: 22 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_8
Related Items (38)
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ FO-like combiners and hybrid post-quantum cryptography ⋮ Tightly secure ring-LWE based key encapsulation with short ciphertexts ⋮ Anonymous, robust post-quantum public key encryption ⋮ Post-quantum security of the Even-Mansour cipher ⋮ Online-extractability in the quantum random-oracle model ⋮ Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber ⋮ Post-quantum Security of Plain OAEP Transform ⋮ Succinct arguments in the quantum random oracle model ⋮ Tighter proofs of CCA security in the quantum random oracle model ⋮ Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption ⋮ Séta: Supersingular Encryption from Torsion Attacks ⋮ Post-quantum anonymity of Kyber ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ A lightweight identification protocol based on lattices ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Redeeming reset indifferentiability and applications to post-quantum security ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Constructive post-quantum reductions ⋮ On quantum ciphertext indistinguishability, recoverability, and OAEP ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Secure Implementation of Lattice-Based Encryption Schemes ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Post-quantum verification of Fujisaki-Okamoto ⋮ Post-quantum resettably-sound zero knowledge ⋮ Quantum key-length extension ⋮ A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ ⋮ Analysis of error-correcting codes for lattice-based key exchange ⋮ Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting ⋮ Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes ⋮ Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security ⋮ Classical vs quantum random oracles
Cites Work
- Unnamed Item
- Unnamed Item
- RSA-OAEP is secure under the RSA assumption
- Quantum Collision-Resistance of Non-uniformly Distributed Functions
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Quantum Position Verification in the Random Oracle Model
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- Computational Security of Quantum Encryption
- Random Oracles in a Quantum World
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Secure integration of asymmetric and symmetric encryption schemes
- Revocable Quantum Timed-Release Encryption
This page was built for publication: Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms