Quantum-access security, where an attacker is granted superposition access to secret-keyed functionalities, is a fundamental security model and its study has inspired results in post-quantum security. We revisit, and fill a gap in, the quantum-access security analysis of the Lamport one-time signature scheme (OTS) in the quantum random oracle model (QROM) by Alagic et al.~(Eurocrypt 2020). We then go on to generalize the technique to the Winternitz OTS. Along the way, we develop a tool for the analysis of hash chains in the QROM based on the superposition oracle technique by Zhandry (Crypto 2019) which might be of independent interest
Quantum Key Distribution was named as one of the top ten emerging technologies by Technology Review ...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...
Quantum-access security, where an attacker is granted superposition access to secret-keyed functiona...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Krüpteerimisprotokollide analüüsimiseks kasutatakse tihti juhusliku oraakli mudelit (JOM), aga postk...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
In this paper, we study relationship between security of cryptographic schemes in the random oracle ...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
Quantum computers are a fact and with the quantum computers follows quantum algorithms. How will qua...
The digital signature scheme, which underpins most of the existing distributed ledgers, is generally...
We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, ...
We propose SOFIA, the first MQ-based signature scheme provably secure in the quantum-accessible rand...
Quantum Key Distribution was named as one of the top ten emerging technologies by Technology Review ...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...
Quantum-access security, where an attacker is granted superposition access to secret-keyed functiona...
We present the first general-purpose digital signature scheme based on supersingular elliptic curve...
Krüpteerimisprotokollide analüüsimiseks kasutatakse tihti juhusliku oraakli mudelit (JOM), aga postk...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...
Quantum secure signature schemes have a lot of attention recently, in particular because of the NIST...
Digital signatures constructed solely from hash functions offer competitive signature sizes and fast...
In this paper, we study relationship between security of cryptographic schemes in the random oracle ...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
Quantum computers are a fact and with the quantum computers follows quantum algorithms. How will qua...
The digital signature scheme, which underpins most of the existing distributed ledgers, is generally...
We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, ...
We propose SOFIA, the first MQ-based signature scheme provably secure in the quantum-accessible rand...
Quantum Key Distribution was named as one of the top ten emerging technologies by Technology Review ...
We study a scheme of Bai and Galbraith (CT-RSA’14), also known as TESLA. TESLA was thought to have a...
Commit-and-open Σ -protocols are a popular class of protocols for constructing non-interactive zero-...