Post-quantum anonymity of Kyber
From MaRDI portal
Publication:6091126
DOI10.1007/978-3-031-31368-4_1zbMath1527.94055OpenAlexW4367663809MaRDI QIDQ6091126
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/20.500.11850/595760
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- One-round key exchange in the standard model
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- A modular analysis of the Fujisaki-Okamoto transformation
- Secure integration of asymmetric and symmetric encryption schemes
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Generic authenticated key exchange in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- Anonymous, robust post-quantum public key encryption
- Anonymity of NIST PQC round 3 KEMs
- Online-extractability in the quantum random-oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Worst-case to average-case reductions for module lattices
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications
- Post-quantum verification of Fujisaki-Okamoto
- (Leveled) fully homomorphic encryption without bootstrapping
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Random Oracles in a Quantum World
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Robust Encryption
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Revocable Quantum Timed-Release Encryption
- Cryptography and Coding
- IND-CCA security of Kyber in the quantum random oracle model, revisited
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
This page was built for publication: Post-quantum anonymity of Kyber