Quantum Random Oracle Model for Quantum Public-Key Encryption [PDF]
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj +2 more sources
Non-uniformity and Quantum Advice in the Quantum Random Oracle Model [PDF]
QROM (quantum random oracle model), introduced by Boneh et al. (Asiacrypt 2011), captures all generic algorithms. However, it fails to describe non-uniform quantum algorithms with preprocessing power, which receives a piece of bounded classical or quantum advice.
Qipeng Liu
openalex +3 more sources
On the Security of NTS-KEM in the Quantum Random Oracle Model [PDF]
Lecture Notes in Computer Science ...
Varun Maram
openalex +4 more sources
Secure Identity-Based Encryption in the Quantum Random Oracle Model [PDF]
We give the first proof of security for an identity-based encryption (IBE) scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that does not rely on the assumed existence of so-called quantum-secure pseudorandom functions (PRFs). Our techniques are quite general and we use them to obtain security
Mark Zhandry
openalex +6 more sources
Formal Indistinguishability Extended to the Random Oracle Model [PDF]
Several generic constructions for transforming one-way func-tions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of their arguments. That is, given the image by a one-way function of a random value, an adversary has only negligible probability to compute this random value. Encryp-tion schemes must
Cristian Ene+2 more
openalex +6 more sources
A Decentralized Signcryption Scheme Based on CFL [PDF]
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj +2 more sources
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [PDF]
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting.
Andrea Coladangelo+2 more
doaj +2 more sources
Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Edward Eaton, Fang Song
openalex +6 more sources
The equivalence of the random oracle model and the ideal cipher model, revisited [PDF]
We consider the cryptographic problem of constructing an invertible random permutation from a public random function (i.e., which can be accessed by the adversary). This goal is formalized by the notion of indifferentiability of Maurer et al. (TCC 2004).
Thomas Holenstein+2 more
openalex +4 more sources
Double-sided: tight proofs for guessing games in the quantum random oracle model
The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al. (CRYPTO 2019) is a crucial technique to solve the reprogramming problem in the quantum random oracle model (QROM), which can lead to quadratically better bounds for many cases ...
Jiawei Bao, Jiangxia Ge, Rui Xue
doaj +2 more sources