Results 11 to 20 of about 90,649 (207)

Quantum Random Oracle Model for Quantum Public-Key Encryption [PDF]

open access: goldIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +2 more sources

Non-uniformity and Quantum Advice in the Quantum Random Oracle Model [PDF]

open access: green, 2023
QROM (quantum random oracle model), introduced by Boneh et al. (Asiacrypt 2011), captures all generic algorithms. However, it fails to describe non-uniform quantum algorithms with preprocessing power, which receives a piece of bounded classical or quantum advice.
Qipeng Liu
openalex   +3 more sources

Secure Identity-Based Encryption in the Quantum Random Oracle Model [PDF]

open access: bronzeInternational Journal of Quantum Information, 2012
We give the first proof of security for an identity-based encryption (IBE) scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model that does not rely on the assumed existence of so-called quantum-secure pseudorandom functions (PRFs). Our techniques are quite general and we use them to obtain security
Mark Zhandry
openalex   +6 more sources

Formal Indistinguishability Extended to the Random Oracle Model [PDF]

open access: green, 2009
Several generic constructions for transforming one-way func-tions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of their arguments. That is, given the image by a one-way function of a random value, an adversary has only negligible probability to compute this random value. Encryp-tion schemes must
Cristian Ene   +2 more
openalex   +6 more sources

A Decentralized Signcryption Scheme Based on CFL [PDF]

open access: yesSensors
The rapid advancement of quantum computing technology poses a significant threat to conventional public key cryptographic infrastructure. The SM2 (state key cryptography algorithm no.
Leyi Shi, Mengting Liu
doaj   +2 more sources

Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [PDF]

open access: goldQuantum
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting.
Andrea Coladangelo   +2 more
doaj   +2 more sources

Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model [PDF]

open access: green, 2015
Strongly unforgeable signature schemes provide a more stringent security guarantee than the standard existential unforgeability. It requires that not only forging a signature on a new message is hard, it is infeasible as well to produce a new signature ...
Edward Eaton, Fang Song
openalex   +6 more sources

The equivalence of the random oracle model and the ideal cipher model, revisited [PDF]

open access: bronzeProceedings of the forty-third annual ACM symposium on Theory of computing, 2011
We consider the cryptographic problem of constructing an invertible random permutation from a public random function (i.e., which can be accessed by the adversary). This goal is formalized by the notion of indifferentiability of Maurer et al. (TCC 2004).
Thomas Holenstein   +2 more
openalex   +4 more sources

Double-sided: tight proofs for guessing games in the quantum random oracle model

open access: diamondCybersecurity
The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al. (CRYPTO 2019) is a crucial technique to solve the reprogramming problem in the quantum random oracle model (QROM), which can lead to quadratically better bounds for many cases ...
Jiawei Bao, Jiangxia Ge, Rui Xue
doaj   +2 more sources

Home - About - Disclaimer - Privacy