Online-extractability in the quantum random-oracle model
From MaRDI portal
Publication:2170106
DOI10.1007/978-3-031-07082-2_24OpenAlexW3159255713MaRDI QIDQ2170106FDOQ2170106
Authors: Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner
Publication date: 30 August 2022
Full work available at URL: https://arxiv.org/abs/2103.03085
Recommendations
Cites Work
- Quantum computation and quantum information. 10th anniversary edition
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- Minimum disclosure proofs of knowledge
- Advances in Cryptology - CRYPTO 2003
- Random oracles in a quantum world
- Title not available (Why is that?)
- Quantum-access-secure message authentication via blind-unforgeability
- A modular analysis of the Fujisaki-Okamoto transformation
- From 5-pass \(\mathcal {MQ}\)-based identification to \(\mathcal {MQ}\)-based signatures
- Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24--26, 2014. Proceedings
- Revocable quantum timed-release encryption
- On finding quantum multi-collisions
- Tighter proofs of CCA security in the quantum random oracle model
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- On the compressed-oracle technique, and post-quantum security of proofs of sequential work
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Revisiting post-quantum Fiat-Shamir
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications
Cited In (25)
- A generic construction of an anonymous reputation system and instantiations from lattices
- Post-quantum anonymity of Kyber
- Efficient NIZKs and signatures from commit-and-open protocols in the QROM
- Generalized special-sound interactive proofs and their knowledge soundness
- NEV: faster and smaller NTRU encryption using vector decoding
- Group action key encapsulation and non-interactive key exchange in the QROM
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- A new framework for quantum oblivious transfer
- QCCA-secure generic transformations in the quantum random oracle model
- From plaintext-extractability to IND-CCA security
- Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Password-authenticated key exchange from group actions
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
- A lightweight identification protocol based on lattices
- Interactive oracle arguments in the QROM and applications to succinct verification of quantum computation
- Quantum CCA-secure PKE, revisited
- Universal composable password authenticated key exchange for the post-quantum world
- A Note on the Instantiability of the Quantum Random Oracle
- A thorough treatment of highly-efficient NTRU instantiations
- On round elimination for special-sound multi-round identification and the generality of the hypercube for MPCitH
- Provable security against decryption failure attacks from LWE
- CDS composition of multi-round protocols
- Non-Observable Quantum Random Oracle Model
- Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
- Two-message authenticated key exchange from public-key encryption
This page was built for publication: Online-extractability in the quantum random-oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2170106)