Tightly-secure key-encapsulation mechanism in the quantum random oracle model

From MaRDI portal
Publication:1653108

DOI10.1007/978-3-319-78372-7_17zbMath1415.94459OpenAlexW4242800683MaRDI QIDQ1653108

Tsunekazu Saito, Takashi Yamakawa, Keita Xagawa

Publication date: 17 July 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-78372-7_17




Related Items (35)

On tight quantum security of HMAC and NMAC in the quantum random oracle modelMemory-Tight Reductions for Practical Key Encapsulation MechanismsEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsFO-like combiners and hybrid post-quantum cryptographyAnonymous, robust post-quantum public key encryptionAnonymity of NIST PQC round 3 KEMsOn IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3Tighter proofs of CCA security in the quantum random oracle modelPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle model\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionAn injectivity analysis of Crystals-Kyber and implications on quantum securityImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMIND-CCA security of Kyber in the quantum random oracle model, revisitedOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelTight adaptive reprogramming in the QROMFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackInstantiability of classical random-oracle-model encryption transformsFailing gracefully: decryption failures and the Fujisaki-Okamoto transformTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsScalable ciphertext compression techniques for post-quantum KEMs and their applicationsPost-quantum verification of Fujisaki-OkamotoTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTighter security proofs for GPV-IBE in the quantum random oracle modelAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityGeneric authenticated key exchange in the quantum random oracle modelQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelOn the integer polynomial learning with errors problemSeparate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability






This page was built for publication: Tightly-secure key-encapsulation mechanism in the quantum random oracle model