2021
DOI: 10.1007/978-3-030-92062-3_22
|View full text |Cite
|
Sign up to set email alerts
|

Tight Adaptive Reprogramming in the QROM

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…Normally, this is not a big issue and the HVZK property will imply the multi-HVZK but this needn't be always the case. In [GHHM21], where the authors argue about the security of the Fiat-Shamir transform, they write "In our security proofs, we will have to argue that collections of honestly generated transcripts are indistinguishable from collections of simulated ones. Since it is not always clear whether computational HVZK implies computational HVZK for multiple transcripts, we extend our definition, accordingly: In the multi-HVZK game, the adversary obtains a collection of transcripts (rather than a single one).…”
Section: Mitigating the Attack: The Salt+ Index Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…Normally, this is not a big issue and the HVZK property will imply the multi-HVZK but this needn't be always the case. In [GHHM21], where the authors argue about the security of the Fiat-Shamir transform, they write "In our security proofs, we will have to argue that collections of honestly generated transcripts are indistinguishable from collections of simulated ones. Since it is not always clear whether computational HVZK implies computational HVZK for multiple transcripts, we extend our definition, accordingly: In the multi-HVZK game, the adversary obtains a collection of transcripts (rather than a single one).…”
Section: Mitigating the Attack: The Salt+ Index Constructionmentioning
confidence: 99%
“…The transformation is proven to be secure in both classical and quantum random-oracle model, if the identification has good properties. Recently in [GHHM21], the Fiat-Shamir is proven to be secure essentially if the underlying identification scheme has low soundness advantage and low t-HVZK advantage. For Stern's identification scheme, the soundness advantage will be immediate and the main focus of our work will be on the t-HVZK advantage.…”
Section: Signature Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…This implies that the only way to get a scheme secure against a quantum adversary is to use both chameleon hashes and other hash functions simulated as quantum random oracles in the proof. In this article, we extend this generic transformation to the QROM with a compatible-with-ROM case proof, using some adaptive reprogramming results of [17] (restated in Proposition 6).…”
Section: Generic Transformationmentioning
confidence: 99%
“…Then, the generic QROM reduction for the Fiat-Shamir transformation from [DFMS19] is used to construct a knowledge extractor for the signature scheme in the QROM from the extractor for the Σ-protocol. Finally, the technique from [GHHM21] is used for simulating the chosen-message oracle to reduce breaking NMA (no-message attack) security to breaking CMA (chosen-message attack) security. This final step connects to the previous one because for the signature scheme the witness extracted from an NMA attacker is the secret key.…”
Section: ⊓ ⊔mentioning
confidence: 99%