Generic authenticated key exchange in the quantum random oracle model

K Hövelmanns, E Kiltz, S Schäge, D Unruh - IACR international conference …, 2020 - Springer
We propose FO_ AKE, a generic construction of two-message authenticated key exchange
(AKE) from any passively secure public key encryption (PKE) in the quantum random oracle …

Quantum proofs of deletion for learning with errors

A Poremba - arXiv preprint arXiv:2203.01610, 2022 - arxiv.org
Quantum information has the property that measurement is an inherently destructive
process. This feature is most apparent in the principle of complementarity, which states that …

Quantum one-wayness of the single-round sponge with invertible permutations

J Carolan, A Poremba - Annual International Cryptology Conference, 2024 - Springer
Sponge hashing is a widely used class of cryptographic hash algorithms which underlies the
current international hash function standard SHA-3. In a nutshell, a sponge function takes as …

Learning-with-errors problem is easy with quantum samples

AB Grilo, I Kerenidis, T Zijlstra - Physical Review A, 2019 - APS
The learning-with-errors (LWE) problem is one of the fundamental problems in
computational learning theory and has in the last years become the cornerstone of …

Misuse attacks on post-quantum cryptosystems

C Băetu, FB Durak, L Huguenin-Dumittan… - Advances in Cryptology …, 2019 - Springer
Many post-quantum cryptosystems which have been proposed in the National Institute of
Standards and Technology (NIST) standardization process follow the same meta-algorithm …

Revocable encryption, programs, and more: The case of multi-copy security

P Ananth, S Mutreja, A Poremba - arXiv preprint arXiv:2410.13163, 2024 - arxiv.org
Fundamental principles of quantum mechanics have inspired many new research directions,
particularly in quantum cryptography. One such principle is quantum no-cloning which has …

Lower bounds for function inversion with quantum advice

KM Chung, TN Liao, L Qian - arXiv preprint arXiv:1911.09176, 2019 - arxiv.org
Function inversion is the problem that given a random function $ f:[M]\to [N] $, we want to find
pre-image of any image $ f^{-1}(y) $ in time $ T $. In this work, we revisit this problem under …

On the state of post-quantum cryptography migration

N Alnahawi, A Wiesmaier, T Grasmeyer, J Geißler… - 2021 - dl.gi.de
Safeguarding current and future IT security from quantum computers implies more than the
mere development of Post-Quantum Cryptography (PQC) algorithms. Much work in this …

How to sign quantum messages

M Barhoush, L Salvail - arXiv preprint arXiv:2304.06325, 2023 - arxiv.org
Signing quantum messages has long been considered impossible even under
computational assumptions. In this work, we challenge this notion and provide three …

Quantum misuse attack on frodo

Y Wang, H Jiang, Z Ma - Entropy, 2022 - mdpi.com
Research on the security of lattice-based public-key encryption schemes against misuse
attacks is an important part of the cryptographic assessment of the National Institute of …