We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Non-Observable Quantum Random Oracle Model

    The random oracle model (ROM), introduced by Bellare and Rogaway (CCS 1993), enables a formal security proof for many (efficient) cryptographic...
    Navid Alamati, Varun Maram, Daniel Masny in Post-Quantum Cryptography
    Conference paper 2023
  2. A Theoretical Framework for the Analysis of Physical Unclonable Function Interfaces and Its Relation to the Random Oracle Model

    Analysis of advanced physical unclonable function (PUF) applications and protocols relies on assuming that a PUF behaves like a random oracle; that...

    Marten van Dijk, Chenglu ** in Journal of Cryptology
    Article Open access 03 August 2023
  3. Random Oracle Model

    Living reference work entry 2023
  4. Signatures with Memory-Tight Security in the Quantum Random Oracle Model

    Memory tightness of reductions in cryptography, in addition to the standard tightness related to advantage and running time, is important when the...
    Conference paper 2024
  5. Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model

    A hash-and-sign signature based on a preimage-sampleable function (Gentry et al., STOC 2008) is secure in the quantum random oracle model if the...
    Haruhisa Kosuge, Keita Xagawa in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  6. Selective Opening Security in the Quantum Random Oracle Model, Revisited

    We prove that two variants of the Fujisaki-Okamoto transformations are selective opening (SO) secure against chosen-ciphertext attacks in the quantum...
    Jiaxin Pan, Runzhi Zeng in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  7. QCCA-Secure Generic Transformations in the Quantum Random Oracle Model

    The post-quantum security of cryptographic schemes assumes that the quantum adversary only receives the classical result of computations with the...
    Tianshu Shan, Jiangxia Ge, Rui Xue in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  8. Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model

    We present a quantumly secure identity-based signature scheme based on the standard short integer solution problem, featuring tight security...
    Ernest Foo, Qinyi Li in Information Security and Privacy
    Conference paper 2023
  9. Non-uniformity and Quantum Advice in the Quantum Random Oracle Model

    QROM (quantum random oracle model), introduced by Boneh et al. (Asiacrypt 2011), captures all generic algorithms. However, it fails to describe...
    Conference paper 2023
  10. Online-Extractability in the Quantum Random-Oracle Model

    We show the following generic result: When a quantum query algorithm in the quantum random-oracle model outputs a classical value t that is promised...
    Jelle Don, Serge Fehr, ... Christian Schaffner in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  11. A Random Oracle for All of Us

    We introduce the notion of a universal random oracle. Analogously to a classical random oracle it idealizes hash functions as random functions....
    Marc Fischlin, Felix Rohrbach, Tobias Schmalz in Progress in Cryptology - AFRICACRYPT 2022
    Conference paper 2022
  12. IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited

    In this paper, we answer the open question pointed out by Grubbs et al. (EUROCRYPT 2022) and Xagawa (EUROCRYPT 2022), i.e., the...
    Zhao Chen, **anhui Lu, ... Bao Li in Information Security and Cryptology
    Conference paper 2023
  13. Linking unknown characters via oracle bone inscriptions retrieval

    Retrieving useful information from existing collections of oracle bone rubbing images plays a pivotal role in the study of oracle bone inscription...

    Feng Gao, Xu Chen, ... Yahong Han in Multimedia Systems
    Article 15 April 2024
  14. Evaluating the Security of CRYSTALS-Dilithium in the Quantum Random Oracle Model

    In the wake of recent progress on quantum computing hardware, the National Institute of Standards and Technology (NIST) is standardizing...
    Kelsey A. Jackson, Carl A. Miller, Daochen Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  15. Universally Composable \(\varSigma \) -protocols in the Global Random-Oracle Model

    Numerous cryptographic applications require efficient non-interactive zero-knowledge proofs of knowledge (NIZKPoK) as a building block. Typically...
    Anna Lysyanskaya, Leah Namisa Rosenbloom in Theory of Cryptography
    Conference paper 2022
  16. The Pseudorandom Oracle Model and Ideal Obfuscation

    We introduce a new idealized model of hash functions, which we refer to as the pseudorandom oracle (Pr...
    Aayush Jain, Huijia Lin, ... Daniel Wichs in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  17. On the (Im)possibility of Time-Lock Puzzles in the Quantum Random Oracle Model

    Time-lock puzzles wrap a solution \(\textrm{s}\)...
    Abtin Afshar, Kai-Min Chung, ... Mohammad Mahmoody in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  18. The Random Fault Model

    In this work, we introduce the random fault model - a more advanced fault model inspired by the random probing model, where the adversary can fault...
    Siemen Dhooghe, Svetla Nikova in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  19. Lower Bound on SNARGs in the Random Oracle Model

    Succinct non-interactive arguments (SNARGs) have become a fundamental primitive in the cryptographic community. The focus of this work is...
    Iftach Haitner, Daniel Nukrai, Eylon Yogev in Advances in Cryptology – CRYPTO 2022
    Conference paper 2022
  20. Instantiability of Classical Random-Oracle-Model Encryption Transforms

    Extending work leveraging program obfuscation to instantiate random-oracle-based transforms (e.g., Hohenberger et al., EUROCRYPT 2014, Kalai el al.,...
    Alice Murphy, Adam O’Neill, Mohammad Zaheri in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.