Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
From MaRDI portal
Publication:2849406
DOI10.1007/978-3-642-40084-1_21zbMath1317.81074OpenAlexW1560564685MaRDI QIDQ2849406
Publication date: 17 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_21
Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (50)
Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing ⋮ Noisy Simon period finding ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms ⋮ Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions ⋮ Post-quantum Security of Plain OAEP Transform ⋮ Quantum attacks on some Feistel block ciphers ⋮ Using Bernstein-Vazirani algorithm to attack block ciphers ⋮ QCB is blindly unforgeable ⋮ Generic models for group actions ⋮ Computational Security of Quantum Encryption ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ Complete analysis of Simon's quantum algorithm with additional collisions ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ A note on the post-quantum security of (ring) signatures ⋮ Group action key encapsulation and non-interactive key exchange in the QROM ⋮ Public key encryption with secure key leasing ⋮ Quantum linearization attacks ⋮ QCB: efficient quantum-secure authenticated encryption ⋮ Applications of Simon's algorithm in quantum attacks on Feistel variants ⋮ Sponge-based authenticated encryption: security against quantum attackers ⋮ Post-quantum plaintext-awareness ⋮ On quantum ciphertext indistinguishability, recoverability, and OAEP ⋮ Quantum attacks on beyond-birthday-bound MACs ⋮ Post-quantum insecurity from LWE ⋮ On security notions for encryption in a quantum world ⋮ Revisiting the security of salted UOV signature ⋮ On the post-quantum security of classical authenticated encryption schemes ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model ⋮ Quantum cryptography beyond quantum key distribution ⋮ Post-quantum resettably-sound zero knowledge ⋮ Relationships between quantum IND-CPA notions ⋮ Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives ⋮ Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images ⋮ Leighton-Micali hash-based signatures in the quantum random-oracle model ⋮ Non-Observable Quantum Random Oracle Model ⋮ Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of Operation ⋮ Breaking LWC candidates: sESTATE and Elephant in quantum setting ⋮ Dispelling myths on superposition attacks: formal security model and attack analyses ⋮ Quantum-access-secure message authentication via blind-unforgeability ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ On Quantum Chosen-Ciphertext Attacks and Learning with Errors ⋮ QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ Semantic Security and Indistinguishability in the Quantum World ⋮ The magic of ELFs ⋮ The Magic of ELFs ⋮ A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies ⋮ Improved BV-based quantum attack on block ciphers ⋮ Quantum indistinguishability for public key encryption
This page was built for publication: Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World