2016
DOI: 10.1103/physreva.94.042314
|View full text |Cite
|
Sign up to set email alerts
|

Quantum random oracle model for quantum digital signature

Abstract: Security analysis of quantum cryptographic protocols is mostly presented with situational quantum attacks and still lacks general analysis methods. As an effective analysis tool in classical cryptography, the random oracle (RO) model has been used to design cryptographic protocols and give rigorous proofs of security over 20 years. In this work, with reference to the classical RO model, we provide a general security analysis tool, namely, the quantum random oracle (QRO), for facilitating the security analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…al. [18]. In this QRO model, all parties including an adversary can query a classical random number generator for classical random bits, a quantum random oracle for random qubits and a measurement device for the comparison result of quantum states.…”
Section: Related Work a Quantum Random Oraclementioning
confidence: 99%
See 3 more Smart Citations
“…al. [18]. In this QRO model, all parties including an adversary can query a classical random number generator for classical random bits, a quantum random oracle for random qubits and a measurement device for the comparison result of quantum states.…”
Section: Related Work a Quantum Random Oraclementioning
confidence: 99%
“…In fact, the secret key is generated locally in the QPKE or the QDS protocols, and this step will not be explored in any classical or quantum communication. Removing G does not violate the security proof in [18]. We mainly focus on possible attacks to quantum hash functions.…”
Section: A Re-definition Of the Qro Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…To further improve practicality, two independent QDS protocols without secure quantum channels were proposed and proved to be secure, which are based on non-orthogonal encoding [17] and orthogonal encoding [18], respectively. After these two protocols, numerous excellent achievements of QDS have been made theoretically and experimentally [19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35]. Protocols based on orthogonal encoding [18,19,33] need additional symmetrization step which results in extra channels.…”
Section: Introductionmentioning
confidence: 99%