Secure identity-based encryption in the quantum random oracle model
From MaRDI portal
Publication:2914299
Recommendations
Cited in
(56)- scientific article; zbMATH DE number 6492475 (Why is no real title available?)
- Cryptanalysis and improvement of verifiable quantum (k,n) secret sharing
- Post-quantum insecurity from LWE
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives
- Compact ring signatures with post-quantum security in standard model
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security
- KDM security for the Fujisaki-Okamoto transformations in the QROM
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs
- Constructive post-quantum reductions
- Short variable length domain extenders with beyond birthday bound security
- A note on the post-quantum security of (ring) signatures
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- Revisiting the security of salted UOV signature
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- On the (im)possibility of time-lock puzzles in the quantum random oracle model
- Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
- Tighter security for generic authenticated key exchange in the QROM
- Towards compressed permutation oracles
- Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
- Anonymous, robust post-quantum public key encryption
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- QCCA-secure generic transformations in the quantum random oracle model
- IND-CCA security of Kyber in the quantum random oracle model, revisited
- Lattice-based programmable hash functions and applications
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
- Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Redeeming reset indifferentiability and applications to post-quantum security
- Traceable ring signatures: general framework and post-quantum security
- Watermarking PRFs against quantum adversaries
- Generic authenticated key exchange in the quantum random oracle model
- Signatures from sequential-OR proofs
- Classical vs quantum random oracles
- A lightweight identification protocol based on lattices
- Succinct arguments in the quantum random oracle model
- Selective opening security in the quantum random oracle model, revisited
- Evaluating the security of CRYSTALS-Dilithium in the quantum random oracle model
- Quantum security proofs using semi-classical oracles
- Secure Stern Signatures in Quantum Random Oracle Model
- SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model
- Recovering the tight security proof of SPHINCS\textsuperscript{+}
- Unconditionally secure commitments with quantum auxiliary inputs
- Symmetries, graph properties, and quantum speedups
- Non-Observable Quantum Random Oracle Model
- A combinatorial approach to quantum random functions
- Classical binding for quantum commitments
- The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions
- Implicit rejection in Fujisaki-Okamoto: framework and a novel realization
- More efficient adaptively secure lattice-based IBE with equality test in the standard model
- Pseudorandom (function-Like) quantum state generators: new definitions and applications
- Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts
- Watermarking PRFs and PKE against quantum adversaries
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
This page was built for publication: Secure identity-based encryption in the quantum random oracle model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2914299)