Главная
Study mode:
on
1
Intro
2
Context: NIST 'competition
3
Prior work on AKE without signatures
4
Outline
5
Limitations of the original work
6
The importance of decryption failures
7
Random Oracle Model (ROM)
8
Quantum Random Oracle Model (QROM)
9
Extracting preimages with 'Oneway to Hiding
10
Overview: Common ground of all current FO proofs
11
Transformation T
12
Transformation U
13
Simplified overview. Subsequent CCA bounds
14
Our setting: 2-move protocols
15
Attacking 2-move protocols
16
Our security model
17
Security of our protocol (Intuition)
18
Open questions
Description:
Explore a conference talk from PKC 2020 examining Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Delve into the limitations of previous work, the significance of decryption failures, and the transition from the Random Oracle Model to the Quantum Random Oracle Model. Understand the 'Oneway to Hiding' technique for extracting preimages, and examine common elements in Fujisaki-Okamoto proofs. Investigate the security challenges of 2-move protocols and gain insights into the proposed security model. Conclude by considering open questions in this field of cryptographic research.

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

TheIACR
Add to list
0:00 / 0:00