Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting
From MaRDI portal
Publication:3297618
DOI10.1007/978-3-030-31578-8_8zbMath1444.94115OpenAlexW2980249697MaRDI QIDQ3297618
Puwen Wei, Haiyang Xue, Zheng-Yu Zhang
Publication date: 20 July 2020
Published in: Cryptology and Network Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-31578-8_8
Uses Software
Cites Work
- Unnamed Item
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- Quantum security proofs using semi-classical oracles
- Tightly-secure encryption in the multi-user, multi-challenge setting with improved efficiency
- Tightly CCA-Secure Encryption Without Pairings
- Learning with Rounding, Revisited
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Tightly Secure Signatures and Public-Key Encryption
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight Security
- Tightly-Secure Signatures from Chameleon Hash Functions
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
- Random Oracles in a Quantum World
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Trapdoors for hard lattices and new cryptographic constructions
- A Framework for Efficient and Composable Oblivious Transfer
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size
- Advances in Cryptology - EUROCRYPT 2004
- Revocable Quantum Timed-Release Encryption
- On lattices, learning with errors, random linear codes, and cryptography
- Tighter security proofs for GPV-IBE in the quantum random oracle model
This page was built for publication: Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting