Scalable ciphertext compression techniques for post-quantum KEMs and their applications
From MaRDI portal
Publication:2692345
DOI10.1007/978-3-030-64837-4_10OpenAlexW3090938627MaRDI QIDQ2692345
Thomas Prest, Federico Pintore, Kris Kwiatkowski, Shuichi Katsumata
Publication date: 21 March 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-64837-4_10
Related Items (5)
More efficient amortization of exact zero-knowledge proofs for LWE ⋮ Online-extractability in the quantum random-oracle model ⋮ Post-quantum anonymity of Kyber ⋮ On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model ⋮ Fork-resilient continuous group key agreement
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- A modular analysis of the Fujisaki-Okamoto transformation
- CSIDH: an efficient post-quantum commutative group action
- On the cost of computing isogenies between supersingular elliptic curves
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Generic authenticated key exchange in the quantum random oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- CCA secure multi-recipient KEM from LPN
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- The double ratchet: security notions, proofs, and modularization for the Signal protocol
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Pseudorandom Functions and Lattices
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Multi-recipient Public-Key Encryption from Simulators in Security Proofs
- Randomness Re-use in Multi-recipient Encryption Schemeas
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited
- Secure integration of asymmetric and symmetric encryption schemes
- Cryptography and Coding
- Randomness Reuse: Extensions and Improvements
- Security in Communication Networks
This page was built for publication: Scalable ciphertext compression techniques for post-quantum KEMs and their applications