Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
From MaRDI portal
Publication:6604884
DOI10.1007/978-981-99-8730-6_14MaRDI QIDQ6604884FDOQ6604884
Authors: Haodong Jiang, Zhi Ma, Zhenfeng Zhang
Publication date: 13 September 2024
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Secure identity-based encryption in the quantum random oracle model
- Secure integration of asymmetric and symmetric encryption schemes
- Random oracles in a quantum world
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- A modular analysis of the Fujisaki-Okamoto transformation
- A cryptographic analysis of the TLS 1.3 handshake protocol
- PRF-ODH: relations, instantiations, and impossibility results
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Tighter proofs of CCA security in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
- Towards bidirectional ratcheted key exchange
- Efficient ratcheting: almost-optimal guarantees for secure messaging
- Cryptography and Coding
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
- Generic authenticated key exchange in the quantum random oracle model
- Classical vs quantum random oracles
- The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more
- How to record quantum queries, and applications to quantum indifferentiability
- Quantum security proofs using semi-classical oracles
- Security of the Fiat-Shamir transformation in the quantum random-oracle model
- More efficient post-quantum KEMTLS with pre-distributed public keys
- Post-quantum asynchronous deniable key exchange and the signal handshake
- On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3
- Online-extractability in the quantum random-oracle model
- Determining the core primitive for optimally secure ratcheting
- Failing gracefully: decryption failures and the Fujisaki-Okamoto transform
- A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs
- Systematic study of decryption and re-encryption leakage: the case of Kyber
This page was built for publication: Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6604884)