Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
From MaRDI portal
Publication:5041241
DOI10.1007/978-3-030-44223-1_29zbMath1500.94033OpenAlexW3013140221MaRDI QIDQ5041241
Patrick Struck, Juliane Krämer
Publication date: 13 October 2022
Published in: Post-Quantum Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-44223-1_29
Related Items (3)
Security of public key encryption against resetting attacks ⋮ Constructive post-quantum reductions ⋮ Classical vs quantum random oracles
Cites Work
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
- Revisiting TESLA in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Tightly secure ring-LWE based key encapsulation with short ciphertexts
- Tighter proofs of CCA security in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Revisiting post-quantum Fiat-Shamir
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Post-quantum security of Fiat-Shamir
- LARA: a design concept for lattice-based encryption
- Mitigating Multi-target Attacks in Hash-Based Signatures
- The Fiat–Shamir Transformation in a Quantum World
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- A Note on Quantum Security for Post-Quantum Cryptography
- Quantum Computation and Quantum Information
- Random Oracles in a Quantum World
- Revocable Quantum Timed-Release Encryption
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Secure integration of asymmetric and symmetric encryption schemes
This page was built for publication: Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security