KDM security for the Fujisaki-Okamoto transformations in the QROM
From MaRDI portal
Publication:6113959
DOI10.1007/978-3-030-97131-1_10zbMath1519.94145OpenAlexW3202079391MaRDI QIDQ6113959
Fuyuki Kitagawa, Ryo Nishimaki
Publication date: 10 August 2023
Published in: Public-Key Cryptography – PKC 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-97131-1_10
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- How to build time-lock encryption
- Secure integration of asymmetric and symmetric encryption schemes
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Generic authenticated key exchange in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- Traceable secret sharing and applications
- Delegating quantum computation in the quantum random oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
- Quantum security proofs using semi-classical oracles
- Blockchains enable non-interactive MPC
- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
- How to Run Turing Machines on Encrypted Data
- Quantum Position Verification in the Random Oracle Model
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- How to share a secret
- Constant-Size Commitments to Polynomials and Their Applications
- High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves
- Random Oracles in a Quantum World
- Revocable Quantum Timed-Release Encryption
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- One-Time Programs
- Circular-Secure Encryption from Decision Diffie-Hellman
- OAEP Is Secure under Key-Dependent Messages
- Nonmalleable Cryptography
- Fully homomorphic encryption using ideal lattices
- How to withstand mobile virus attacks (extended abstract)
- KDM Security in the Hybrid Framework
- KDM security for the Fujisaki-Okamoto transformations in the QROM
This page was built for publication: KDM security for the Fujisaki-Okamoto transformations in the QROM