Tightly-secure key-encapsulation mechanism in the quantum random oracle model
From MaRDI portal
Publication:1653108
DOI10.1007/978-3-319-78372-7_17zbMath1415.94459OpenAlexW4242800683MaRDI QIDQ1653108
Tsunekazu Saito, Takashi Yamakawa, Keita Xagawa
Publication date: 17 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78372-7_17
Related Items (35)
On tight quantum security of HMAC and NMAC in the quantum random oracle model ⋮ Memory-Tight Reductions for Practical Key Encapsulation Mechanisms ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ FO-like combiners and hybrid post-quantum cryptography ⋮ Anonymous, robust post-quantum public key encryption ⋮ Anonymity of NIST PQC round 3 KEMs ⋮ On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 ⋮ Tighter proofs of CCA security in the quantum random oracle model ⋮ Post-quantum anonymity of Kyber ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ An injectivity analysis of Crystals-Kyber and implications on quantum security ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Tight adaptive reprogramming in the QROM ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Failing gracefully: decryption failures and the Fujisaki-Okamoto transform ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Post-quantum verification of Fujisaki-Okamoto ⋮ Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ (One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemes ⋮ Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model ⋮ On the integer polynomial learning with errors problem ⋮ Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability
This page was built for publication: Tightly-secure key-encapsulation mechanism in the quantum random oracle model