On the Security Notions for Encryption in a Quantum World
暂无分享,去创建一个
[1] U. Vazirani. On the power of quantum computation , 1998, Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.
[2] Mark Zhandry,et al. Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World , 2013, CRYPTO.
[3] Brent Waters,et al. Lossy trapdoor functions and their applications , 2008, SIAM J. Comput..
[4] Mark Zhandry,et al. A Note on Quantum-Secure PRPs , 2016, IACR Cryptol. ePrint Arch..
[5] David Jao,et al. Post-Quantum Security Models for Authenticated Encryption , 2016, PQCrypto.
[6] Tommaso Gagliardoni,et al. Semantic Security and Indistinguishability in the Quantum World , 2015, IACR Cryptol. ePrint Arch..
[7] Daniel R. Simon,et al. On the power of quantum computation , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[8] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, Journal of Cryptology.
[9] Elham Kashefi,et al. Comparison of quantum oracles , 2002 .
[10] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[11] Mark Zhandry,et al. Quantum-Secure Message Authentication Codes , 2013, IACR Cryptol. ePrint Arch..
[12] Stacey Jeffery,et al. Quantum Homomorphic Encryption for Circuits of Low T-gate Complexity , 2014, CRYPTO.
[13] Amit Sahai,et al. Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization , 1999, CRYPTO.
[14] Pérès,et al. Quantum-state disturbance versus information gain: Uncertainty relations for quantum information. , 1995, Physical review. A, Atomic, molecular, and optical physics.
[15] Mark Zhandry,et al. How to Construct Quantum Random Functions , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[16] Dominique Unruh,et al. Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation , 2016, PQCrypto.
[17] Dominique Unruh,et al. Revocable Quantum Timed-Release Encryption , 2014, J. ACM.
[18] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[19] Dominique Unruh,et al. On quantum indistinguishability under chosen plaintext attack , 2020, IACR Cryptol. ePrint Arch..
[20] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[21] Ivan Damgård,et al. Superposition Attacks on Cryptographic Protocols , 2011, ICITS.
[22] Abhi Shelat,et al. Relations Among Notions of Non-malleability for Encryption , 2007, ASIACRYPT.
[23] Tommaso Gagliardoni,et al. Unforgeable Quantum Encryption , 2017, IACR Cryptol. ePrint Arch..
[24] María Naya-Plasencia,et al. Breaking Symmetric Cryptosystems Using Quantum Period Finding , 2016, CRYPTO.
[25] Mark Zhandry,et al. Random Oracles in a Quantum World , 2010, ASIACRYPT.
[26] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[27] Christian Schaffner,et al. Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability , 2019, IACR Cryptol. ePrint Arch..
[28] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[29] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[30] Mark Zhandry,et al. How to Record Quantum Queries, and Applications to Quantum Indifferentiability , 2019, IACR Cryptol. ePrint Arch..
[31] Travis S. Humble,et al. Quantum supremacy using a programmable superconducting processor , 2019, Nature.
[32] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[33] Isaac L. Chuang,et al. Quantum Computation and Quantum Information (10th Anniversary edition) , 2011 .