Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
DOI10.1007/978-3-030-25510-7_13OpenAlexW2958917282MaRDI QIDQ2302136FDOQ2302136
Authors: Haodong Jiang, Zhenfeng Zhang, Zhi Ma
Publication date: 25 February 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-25510-7_13
Recommendations
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
- Generic authenticated key exchange in the quantum random oracle model
Cryptography (94A60) Quantum coding (general) (81P70) Semiclassical techniques, including WKB and Maslov methods applied to problems in quantum theory (81Q20) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25)
Cited In (20)
- Title not available (Why is that?)
- Power of randomness recovery: tighter CCA-secure KEM in the QROM
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
- Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- QCCA-secure generic transformations in the quantum random oracle model
- IND-CCA security of Kyber in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Instantiability of classical random-oracle-model encryption transforms
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications
- Tighter proofs of CCA security in the quantum random oracle model
- Generic authenticated key exchange in the quantum random oracle model
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model
- Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
This page was built for publication: Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2302136)