Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, strong “quantum access” security models have shown that numerous symmetric-key cryptosystems are also vulnerable. In this paper, we consider classical encryption in a model that grants the adversary quantum oracle access to encryption and decryption, but where we restrict the latter to non-adaptive (i.e., pre-challenge) queries only. We formalize this model using appropriate notions of ciphertext indistinguishability and semantic security (which are equivalent by standard arguments) and call it QCCA 1 in analogy to the classical CCA 1 security model. We show that the standard pseudorandom function (PRF)-based encryption schemes are QCCA 1 -sec...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Quantum computing is a significant threat to classical public-key cryptography. In strong "quantum a...
Large-scale quantum computing is a significant threat to classical public-key cryptography. In strong...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
The qINDqCPA security notion for public-key encryption schemes by Gagliardoni et al. (PQCrypto’21) m...
International audienceIndistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) is ...
We study the problem of encrypting and authenticating quantum data in the presence of adversaries ma...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
We study the problem of encrypting and authenticating quantum data in the presence of adversaries ma...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Large-scale quantum computing poses a major threat to classical public-key cryptography. Recently, s...
Quantum computing is a significant threat to classical public-key cryptography. In strong "quantum a...
Large-scale quantum computing is a significant threat to classical public-key cryptography. In strong...
AbstractModern cryptography is based on various building blocks such as one way functions with or wi...
The qINDqCPA security notion for public-key encryption schemes by Gagliardoni et al. (PQCrypto’21) m...
International audienceIndistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) is ...
We study the problem of encrypting and authenticating quantum data in the presence of adversaries ma...
Post-quantum cryptography studies the security of classical, i.e. non-quantum cryptographic protocol...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
We study the problem of encrypting and authenticating quantum data in the presence of adversaries ma...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...
The provable security paradigm is an important tool to show security of cryptographic primitives. He...