Secure Identity-Based Encryption in the Quantum Random Oracle Model

From MaRDI portal
Publication:2914299

DOI10.1007/978-3-642-32009-5_44zbMath1296.94147OpenAlexW2400048261MaRDI QIDQ2914299

Mark Zhandry

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_44




Related Items (39)

Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharingEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKsShort variable length domain extenders with beyond birthday bound securityBuilding quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructionsPost-Quantum Security of the Fujisaki-Okamoto and OAEP TransformsAnonymous, robust post-quantum public key encryptionWatermarking PRFs against quantum adversariesSuccinct arguments in the quantum random oracle modelQCCA-secure generic transformations in the quantum random oracle modelA lightweight identification protocol based on latticesThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsMore efficient adaptively secure lattice-based IBE with equality test in the standard modelImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMA note on the post-quantum security of (ring) signaturesPseudorandom (function-Like) quantum state generators: new definitions and applicationsRecovering the tight security proof of SPHINCS\textsuperscript{+}IND-CCA security of Kyber in the quantum random oracle model, revisitedRedeeming reset indifferentiability and applications to post-quantum securityConstructive post-quantum reductionsPost-quantum insecurity from LWERevisiting the security of salted UOV signatureLattice-based programmable hash functions and applicationsTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelA combinatorial approach to quantum random functionsClassical binding for quantum commitmentsProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldBeing a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitivesTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTraceable ring signatures: general framework and post-quantum securityAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionTighter security proofs for GPV-IBE in the quantum random oracle modelAdaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymitySignatures from sequential-OR proofsGeneric authenticated key exchange in the quantum random oracle modelClassical vs quantum random oraclesProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesQuantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts




This page was built for publication: Secure Identity-Based Encryption in the Quantum Random Oracle Model