Security of the Fiat-Shamir transformation in the quantum random-oracle model

From MaRDI portal
Publication:2304988

DOI10.1007/978-3-030-26951-7_13OpenAlexW2917473520MaRDI QIDQ2304988

Christian Schaffner, Christian Majenz, Jelle Don, Serge Fehr

Publication date: 9 March 2020

Full work available at URL: https://arxiv.org/abs/1902.07556




Related Items

Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based CryptographyA Note on the Instantiability of the Quantum Random OracleEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsLESS is More: Code-Based Signatures Without SyndromesPost-quantum adaptor signature for privacy-preserving off-chain paymentsOne-time traceable ring signaturesAn isogeny-based ID protocol using structured public keysBlack-box accumulation based on latticesA simple post-quantum non-interactive zero-knowledge proof from garbled circuitsPost-quantum security of the Even-Mansour cipherPractical post-quantum signature schemes from isomorphism problems of trilinear formsOnline-extractability in the quantum random-oracle modelSuccinct arguments in the quantum random oracle modelPKP-based signature schemeClassical and quantum security of elliptic curve VRF, via relative indifferentiabilityA lower bound on the length of signatures based on group actions and generic isogeniesA generic transform from multi-round interactive proof to NIZKA thorough treatment of highly-efficient NTRU instantiationsEfficient NIZKs and signatures from commit-and-open protocols in the QROMA note on the post-quantum security of (ring) signaturesClassically verifiable NIZK for QMA with preprocessingFiat-Shamir transformation of multi-round interactive proofs (Extended version)On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelRedeeming reset indifferentiability and applications to post-quantum securityTight adaptive reprogramming in the QROMNew constructions of collapsing hashesConstructive post-quantum reductionsOn actively secure fine-grained access structures from isogeny assumptionsA new framework for quantum oblivious transferSecure computation with shared EPR pairs (or: how to teleport in zero-knowledge)A detailed analysis of Fiat-Shamir with abortsSecure quantum computation with classical communicationPost-quantum resettably-sound zero knowledgeTighter security proofs for GPV-IBE in the quantum random oracle modelSigma protocols for MQ, PKP and SIS, and fishy signature schemesSignatures from sequential-OR proofsEfficient simulation of random states and random unitariesMPSign: a signature from small-secret middle-product learning with errorsLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Threshold ring signatures: new definitions and post-quantum securityClassical vs quantum random oraclesBanquet: short and fast signatures from AESRound-optimal verifiable oblivious pseudorandom functions from ideal latticesA non-PCP approach to succinct quantum-safe zero-knowledgeThe measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and moreQMA-Hardness of Consistency of Local Density Matrices with Applications to Quantum Zero-Knowledge\textsf{CSI-RAShi}: distributed key generation for CSIDH