Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World

From MaRDI portal
Publication:2849406

DOI10.1007/978-3-642-40084-1_21zbMath1317.81074OpenAlexW1560564685MaRDI QIDQ2849406

Dan Boneh, Mark Zhandry

Publication date: 17 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_21




Related Items (50)

Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharingNoisy Simon period findingA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsPost-Quantum Security of the Fujisaki-Okamoto and OAEP TransformsQuantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptionsPost-quantum Security of Plain OAEP TransformQuantum attacks on some Feistel block ciphersUsing Bernstein-Vazirani algorithm to attack block ciphersQCB is blindly unforgeableGeneric models for group actionsComputational Security of Quantum EncryptionQCCA-secure generic transformations in the quantum random oracle modelComplete analysis of Simon's quantum algorithm with additional collisionsA quantum related-key attack based on the Bernstein-Vazirani algorithmA note on the post-quantum security of (ring) signaturesGroup action key encapsulation and non-interactive key exchange in the QROMPublic key encryption with secure key leasingQuantum linearization attacksQCB: efficient quantum-secure authenticated encryptionApplications of Simon's algorithm in quantum attacks on Feistel variantsSponge-based authenticated encryption: security against quantum attackersPost-quantum plaintext-awarenessOn quantum ciphertext indistinguishability, recoverability, and OAEPQuantum attacks on beyond-birthday-bound MACsPost-quantum insecurity from LWEOn security notions for encryption in a quantum worldRevisiting the security of salted UOV signatureOn the post-quantum security of classical authenticated encryption schemesTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelQuantum cryptography beyond quantum key distributionPost-quantum resettably-sound zero knowledgeRelationships between quantum IND-CPA notionsBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesQuantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital imagesLeighton-Micali hash-based signatures in the quantum random-oracle modelNon-Observable Quantum Random Oracle ModelCharacterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of OperationBreaking LWC candidates: sESTATE and Elephant in quantum settingDispelling myths on superposition attacks: formal security model and attack analysesQuantum-access-secure message authentication via blind-unforgeabilityGeneric authenticated key exchange in the quantum random oracle modelOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelBreaking Symmetric Cryptosystems Using Quantum Period FindingSemantic Security and Indistinguishability in the Quantum WorldThe magic of ELFsThe Magic of ELFsA Post-quantum Digital Signature Scheme Based on Supersingular IsogeniesImproved BV-based quantum attack on block ciphersQuantum indistinguishability for public key encryption







This page was built for publication: Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World