Quantum-access security of hash-based signature schemes
From MaRDI portal
Publication:6535492
DOI10.1007/978-3-031-35486-1_16zbMATH Open1546.81059MaRDI QIDQ6535492
Masayuki Abe, Quan Yuan, Mehdi Tibouchi
Publication date: 11 January 2024
digital signaturespost-quantum cryptographyhash-based signaturesquantum securitysuperposition attacks
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- New security notions and feasibility results for authentication of quantum data
- Quantum-access-secure message authentication via blind-unforgeability
- Classical vs quantum random oracles
- On subset-resilient hash function families
- 4-round Luby-Rackoff construction is a qPRP
- Quantum attacks without superposition queries: the offline Simon's algorithm
- Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations
- Improving stateless hash-based signatures
- How to record quantum queries, and applications to quantum indifferentiability
- Mitigating Multi-target Attacks in Hash-Based Signatures
- ARMed SPHINCS
- Semantic Security and Indistinguishability in the Quantum World
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- SPHINCS: Practical Stateless Hash-Based Signatures
- Random Oracles in a Quantum World
- XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions
- Quantum lower bounds for the collision and the element distinctness problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Foundations of Cryptography
- Quantum-Secure Message Authentication Codes
- A note on the post-quantum security of (ring) signatures
- Recovering the tight security proof of SPHINCS\textsuperscript{+}
- Tight adaptive reprogramming in the QROM
Related Items (1)
This page was built for publication: Quantum-access security of hash-based signature schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535492)