Secure identity-based encryption in the quantum random oracle model
From MaRDI portal
Publication:2914299
DOI10.1007/978-3-642-32009-5_44zbMATH Open1296.94147OpenAlexW2400048261MaRDI QIDQ2914299FDOQ2914299
Authors: Mark Zhandry
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_44
Recommendations
Cited In (56)
- Selective opening security in the quantum random oracle model, revisited
- Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
- Unconditionally secure commitments with quantum auxiliary inputs
- Symmetries, graph properties, and quantum speedups
- Title not available (Why is that?)
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing
- Post-quantum insecurity from LWE
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives
- Compact ring signatures with post-quantum security in standard model
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs
- Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions
- Constructive post-quantum reductions
- Short variable length domain extenders with beyond birthday bound security
- A note on the post-quantum security of (ring) signatures
- Revisiting the security of salted UOV signature
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- On the (im)possibility of time-lock puzzles in the quantum random oracle model
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- Tighter security for generic authenticated key exchange in the QROM
- Towards compressed permutation oracles
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
- QCCA-secure generic transformations in the quantum random oracle model
- IND-CCA security of Kyber in the quantum random oracle model, revisited
- Anonymous, robust post-quantum public key encryption
- Lattice-based programmable hash functions and applications
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
- Redeeming reset indifferentiability and applications to post-quantum security
- Traceable ring signatures: general framework and post-quantum security
- Watermarking PRFs against quantum adversaries
- Generic authenticated key exchange in the quantum random oracle model
- Signatures from sequential-OR proofs
- Classical vs quantum random oracles
- A lightweight identification protocol based on lattices
- Succinct arguments in the quantum random oracle model
- Secure Stern Signatures in Quantum Random Oracle Model
- Quantum security proofs using semi-classical oracles
- SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model
- Recovering the tight security proof of SPHINCS\textsuperscript{+}
- Non-Observable Quantum Random Oracle Model
- The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions
- A combinatorial approach to quantum random functions
- Classical binding for quantum commitments
- Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
- More efficient adaptively secure lattice-based IBE with equality test in the standard model
- Pseudorandom (function-Like) quantum state generators: new definitions and applications
- Watermarking PRFs and PKE against quantum adversaries
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
This page was built for publication: Secure identity-based encryption in the quantum random oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2914299)