Secure Identity-Based Encryption in the Quantum Random Oracle Model
From MaRDI portal
Publication:2914299
DOI10.1007/978-3-642-32009-5_44zbMath1296.94147OpenAlexW2400048261MaRDI QIDQ2914299
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_44
Related Items (39)
Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing ⋮ Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security ⋮ A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs ⋮ Short variable length domain extenders with beyond birthday bound security ⋮ Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions ⋮ Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms ⋮ Anonymous, robust post-quantum public key encryption ⋮ Watermarking PRFs against quantum adversaries ⋮ Succinct arguments in the quantum random oracle model ⋮ QCCA-secure generic transformations in the quantum random oracle model ⋮ A lightweight identification protocol based on lattices ⋮ The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions ⋮ More efficient adaptively secure lattice-based IBE with equality test in the standard model ⋮ Implicit rejection in Fujisaki-Okamoto: framework and a novel realization ⋮ KDM security for the Fujisaki-Okamoto transformations in the QROM ⋮ A note on the post-quantum security of (ring) signatures ⋮ Pseudorandom (function-Like) quantum state generators: new definitions and applications ⋮ Recovering the tight security proof of SPHINCS\textsuperscript{+} ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ Redeeming reset indifferentiability and applications to post-quantum security ⋮ Constructive post-quantum reductions ⋮ Post-quantum insecurity from LWE ⋮ Revisiting the security of salted UOV signature ⋮ Lattice-based programmable hash functions and applications ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model ⋮ A combinatorial approach to quantum random functions ⋮ Classical binding for quantum commitments ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives ⋮ Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting ⋮ Traceable ring signatures: general framework and post-quantum security ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ Signatures from sequential-OR proofs ⋮ Generic authenticated key exchange in the quantum random oracle model ⋮ Classical vs quantum random oracles ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
This page was built for publication: Secure Identity-Based Encryption in the Quantum Random Oracle Model