QCCA-secure generic transformations in the quantum random oracle model
From MaRDI portal
Publication:6091127
DOI10.1007/978-3-031-31368-4_2zbMath1527.94065OpenAlexW4367663746MaRDI QIDQ6091127
No author found.
Publication date: 24 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-31368-4_2
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Secure integration of asymmetric and symmetric encryption schemes
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- On the compressed-oracle technique, and post-quantum security of proofs of sequential work
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3
- Online-extractability in the quantum random-oracle model
- Succinct arguments in the quantum random oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Semantic Security and Indistinguishability in the Quantum World
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Random Oracles in a Quantum World
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
This page was built for publication: QCCA-secure generic transformations in the quantum random oracle model