Computational Security of Quantum Encryption
From MaRDI portal
Publication:2953808
DOI10.1007/978-3-319-49175-2_3zbMath1407.94068arXiv1602.01441OpenAlexW3103084439MaRDI QIDQ2953808
Gorjan Alagic, Bill Fefferman, Michael st. Jules, Anne Broadbent, Christian Schaffner, Tommaso Gagliardoni
Publication date: 6 January 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1602.01441
Related Items (14)
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms ⋮ Composable and finite computational security of quantum message transmission ⋮ Block encryption of quantum messages ⋮ Computational Security of Quantum Encryption ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness ⋮ Quantum image encryption based on quantum image decomposition ⋮ Unnamed Item ⋮ Breaking Symmetric Cryptosystems Using Quantum Period Finding ⋮ Quantum Homomorphic Encryption for Polynomial-Sized Circuits ⋮ Semantic Security and Indistinguishability in the Quantum World ⋮ IND-secure quantum symmetric encryption based on point obfuscation ⋮ Quantum permutation pad for universal quantum-safe cryptography ⋮ Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Using quantum key distribution for cryptographic purposes: a survey
- Statistical zero knowledge and quantum one-way functions
- Quantum cryptography beyond quantum key distribution
- Entropic security in quantum cryptography
- Probabilistic encryption
- Randomizing quantum states: constructions and applications
- Semantic Security and Indistinguishability in the Quantum World
- Quantum One-Time Programs
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Actively Secure Two-Party Evaluation of Any Quantum Operation
- A Note on Quantum Security for Post-Quantum Cryptography
- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
- Computational Security of Quantum Encryption
- Random Oracles in a Quantum World
- Quantum money from hidden subspaces
- Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity
- Lossy trapdoor functions and their applications
- Trapdoors for hard lattices and new cryptographic constructions
- Universally Composable Quantum Multi-party Computation
- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
- Communication Theory of Secrecy Systems*
- New directions in cryptography
- A Pseudorandom Generator from any One-way Function
- Foundations of Cryptography
- Feasibility and Completeness of Cryptographic Tasks in the Quantum World
- Universal Blind Quantum Computation
- Quantum Entropic Security and Approximate Quantum Encryption
- A single quantum cannot be cloned
- Revocable Quantum Timed-Release Encryption
This page was built for publication: Computational Security of Quantum Encryption