Random Oracles in a Quantum World Dan Boneh 1 ur Dagdelen 2 Marc - - PowerPoint PPT Presentation

random oracles in a quantum world
SMART_READER_LITE
LIVE PREVIEW

Random Oracles in a Quantum World Dan Boneh 1 ur Dagdelen 2 Marc - - PowerPoint PPT Presentation

Introduction Positive Results Conclusion Random Oracles in a Quantum World Dan Boneh 1 ur Dagdelen 2 Marc Fischlin 2 Ozg Anja Lehmann 3 Christian Schaffner 4 Mark Zhandry 1 1 Stanford University, USA 2 CASED & Darmstadt University of


slide-1
SLIDE 1

Introduction Positive Results Conclusion

Random Oracles in a Quantum World

Dan Boneh1 ¨ Ozg¨ ur Dagdelen2 Marc Fischlin2 Anja Lehmann3 Christian Schaffner4 Mark Zhandry1

1Stanford University, USA 2CASED & Darmstadt University of Technology, Germany 3IBM Research Zurich, Switzerland 4University of Amsterdam and CWI, The Netherlands

December 5, 2011

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-2
SLIDE 2

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Classical Random Oracle Model Adversaries

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-3
SLIDE 3

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Quantum Random Oracle Model Adversaries

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-4
SLIDE 4

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Quantum Random Oracle Model (QROM)

Why quantum queries? Random oracle models hash function, which a quantum adversary can evaluate on superposition.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-5
SLIDE 5

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Quantum Random Oracle Model (QROM)

Why quantum queries? Random oracle models hash function, which a quantum adversary can evaluate on superposition. Because quantum adversaries can query on a superposition, classical proofs of security do not carry over to the quantum setting.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-6
SLIDE 6

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Quantum Random Oracle Model (QROM)

Why quantum queries? Random oracle models hash function, which a quantum adversary can evaluate on superposition. Because quantum adversaries can query on a superposition, classical proofs of security do not carry over to the quantum setting. Examples:

Simulating the random oracle Determining what points the adversary is interested in Programming the random oracle Rewinding

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-7
SLIDE 7

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Our Results

Separation result: Scheme secure in classical ROM, but insecure in QROM

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-8
SLIDE 8

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Our Results

Separation result: Scheme secure in classical ROM, but insecure in QROM

Identification scheme

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-9
SLIDE 9

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Our Results

Separation result: Scheme secure in classical ROM, but insecure in QROM

Identification scheme

Positive result: Signature Schemes

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-10
SLIDE 10

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Our Results

Separation result: Scheme secure in classical ROM, but insecure in QROM

Identification scheme

Positive result: Signature Schemes

Some classical security proofs carry over (if quantum PRFs exist).

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-11
SLIDE 11

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Our Results

Separation result: Scheme secure in classical ROM, but insecure in QROM

Identification scheme

Positive result: Signature Schemes

Some classical security proofs carry over (if quantum PRFs exist). Example: Lattice-based signatures ([GPV08]) Example: Specific instances of Full Domain Hash Generic Full Domain Hash is still open.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-12
SLIDE 12

Introduction Positive Results Conclusion Quantum Random Oracle Model Our Results

Our Results

Separation result: Scheme secure in classical ROM, but insecure in QROM

Identification scheme

Positive result: Signature Schemes

Some classical security proofs carry over (if quantum PRFs exist). Example: Lattice-based signatures ([GPV08]) Example: Specific instances of Full Domain Hash Generic Full Domain Hash is still open.

Positive result: Encryption Schemes

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-13
SLIDE 13

Introduction Positive Results Conclusion Signatures Encryption Schemes

Preimage Sampleable Functions

A preimage sampleable trapdoor function (PSF) F is a triple

  • f functions (G, f , f −1):

G(1n) outputs (sk, pk) fpk(x) is efficiently computable, uniformly distributed for random x. f −1

sk (y) samples uniformly from the set of x such that

fpk(x) = y

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-14
SLIDE 14

Introduction Positive Results Conclusion Signatures Encryption Schemes

Preimage Sampleable Functions

A preimage sampleable trapdoor function (PSF) F is a triple

  • f functions (G, f , f −1):

G(1n) outputs (sk, pk) fpk(x) is efficiently computable, uniformly distributed for random x. f −1

sk (y) samples uniformly from the set of x such that

fpk(x) = y

F = (G, f , f −1) is secure if it is one-way, collision-resistant, and has high preimage min-entropy.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-15
SLIDE 15

Introduction Positive Results Conclusion Signatures Encryption Schemes

Preimage Sampleable Functions

A preimage sampleable trapdoor function (PSF) F is a triple

  • f functions (G, f , f −1):

G(1n) outputs (sk, pk) fpk(x) is efficiently computable, uniformly distributed for random x. f −1

sk (y) samples uniformly from the set of x such that

fpk(x) = y

F = (G, f , f −1) is secure if it is one-way, collision-resistant, and has high preimage min-entropy. Secure construction from lattices [GPV08]

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-16
SLIDE 16

Introduction Positive Results Conclusion Signatures Encryption Schemes

Example: GPV Signatures

Given a PSF F = (G, f , f −1), construct a signature scheme SO = (G, SO, V O) as follows:

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-17
SLIDE 17

Introduction Positive Results Conclusion Signatures Encryption Schemes

Example: GPV Signatures

Given a PSF F = (G, f , f −1), construct a signature scheme SO = (G, SO, V O) as follows: SO

sk(m) = f −1 sk (O(m)). Remember this output for future

queries of m

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-18
SLIDE 18

Introduction Positive Results Conclusion Signatures Encryption Schemes

Example: GPV Signatures

Given a PSF F = (G, f , f −1), construct a signature scheme SO = (G, SO, V O) as follows: SO

sk(m) = f −1 sk (O(m)). Remember this output for future

queries of m V O

pk(m, σ) accepts if and only if fpk(σ) = O(m).

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-19
SLIDE 19

Introduction Positive Results Conclusion Signatures Encryption Schemes

Example: GPV Signatures

Given a PSF F = (G, f , f −1), construct a signature scheme SO = (G, SO, V O) as follows: SO

sk(m) = f −1 sk (O(m)). Remember this output for future

queries of m V O

pk(m, σ) accepts if and only if fpk(σ) = O(m).

Theorem Suppose F is a quantum-secure PSF, and that quantum pseudorandom functions exist. Then S is quantum secure.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-20
SLIDE 20

Introduction Positive Results Conclusion Signatures Encryption Schemes

Security of GPV Signatures

Two parts:

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-21
SLIDE 21

Introduction Positive Results Conclusion Signatures Encryption Schemes

Security of GPV Signatures

Two parts: Prove that security of a certain type of classical reduction (called history free) implies security in the quantum setting

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-22
SLIDE 22

Introduction Positive Results Conclusion Signatures Encryption Schemes

Security of GPV Signatures

Two parts: Prove that security of a certain type of classical reduction (called history free) implies security in the quantum setting Show that the reduction of [GPV08] is history free

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-23
SLIDE 23

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques:

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-24
SLIDE 24

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-25
SLIDE 25

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-26
SLIDE 26

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Determine what points the adversary is querying the oracle

  • n.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-27
SLIDE 27

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Determine what points the adversary is querying the oracle

  • n.

Not allowed.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-28
SLIDE 28

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Determine what points the adversary is querying the oracle

  • n.

Not allowed.

Programming the random oracle.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-29
SLIDE 29

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Determine what points the adversary is querying the oracle

  • n.

Not allowed.

Programming the random oracle.

Only non-adaptively (i.e. no knowledge of previous queries)

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-30
SLIDE 30

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Determine what points the adversary is querying the oracle

  • n.

Not allowed.

Programming the random oracle.

Only non-adaptively (i.e. no knowledge of previous queries)

Rewinding

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-31
SLIDE 31

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Classical RO Techniques: Simulating the random oracle.

Use a random oracle.

Determine what points the adversary is querying the oracle

  • n.

Not allowed.

Programming the random oracle.

Only non-adaptively (i.e. no knowledge of previous queries)

Rewinding

Not allowed.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-32
SLIDE 32

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-33
SLIDE 33

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Reduction algorithm has private random oracle Oc

Implemented on the fly

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-34
SLIDE 34

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Reduction algorithm has private random oracle Oc

Implemented on the fly

Random oracle queries answered by RandOc

Truly random

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-35
SLIDE 35

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History-free Reduction

Reduction algorithm has private random oracle Oc

Implemented on the fly

Random oracle queries answered by RandOc

Truly random

Signatures answered by SignOc

Consistent with random oracle Distribution identical to actual

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-36
SLIDE 36

Introduction Positive Results Conclusion Signatures Encryption Schemes

(Classical) History Free Reduction

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-37
SLIDE 37

Introduction Positive Results Conclusion Signatures Encryption Schemes

Main Theorem

Theorem Suppose a random oracle model signature scheme S has a history-free reduction that transforms any classical adversary A into a classical algorithm B for some hard problem for quantum

  • computers. Suppose further that quantum pseudorandom

functions exist. Then S is secure against quantum adversaries.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-38
SLIDE 38

Introduction Positive Results Conclusion Signatures Encryption Schemes

Proof

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-39
SLIDE 39

Introduction Positive Results Conclusion Signatures Encryption Schemes

Proof

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-40
SLIDE 40

Introduction Positive Results Conclusion Signatures Encryption Schemes

Problem

Quantum adversary could query on a superposition of exponentially many inputs.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-41
SLIDE 41

Introduction Positive Results Conclusion Signatures Encryption Schemes

Problem

Quantum adversary could query on a superposition of exponentially many inputs. Results in queries to Oq on exponential superposition.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-42
SLIDE 42

Introduction Positive Results Conclusion Signatures Encryption Schemes

Problem

Quantum adversary could query on a superposition of exponentially many inputs. Results in queries to Oq on exponential superposition. Implementing the random oracle would require exponential randomness.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-43
SLIDE 43

Introduction Positive Results Conclusion Signatures Encryption Schemes

Problem

Quantum adversary could query on a superposition of exponentially many inputs. Results in queries to Oq on exponential superposition. Implementing the random oracle would require exponential randomness. Idea: Use a quantum pseudorandom function

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-44
SLIDE 44

Introduction Positive Results Conclusion Signatures Encryption Schemes

Quantum PRF

A quantum pseudorandom function PRF is a keyed function that quantum computers cannot tell from a random oracle. Precisely, for all polynomial-time quantum oracle algorithms A,

  • Pr[APRFk() = 1] − Pr[AOq() = 1]
  • < negl

Where the left probability is over k and the right is over Oq, both chosen randomly.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-45
SLIDE 45

Introduction Positive Results Conclusion Signatures Encryption Schemes

Quantum PRF

A quantum pseudorandom function PRF is a keyed function that quantum computers cannot tell from a random oracle. Precisely, for all polynomial-time quantum oracle algorithms A,

  • Pr[APRFk() = 1] − Pr[AOq() = 1]
  • < negl

Where the left probability is over k and the right is over Oq, both chosen randomly.

No known provably secure constructions!

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-46
SLIDE 46

Introduction Positive Results Conclusion Signatures Encryption Schemes

Proof

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-47
SLIDE 47

Introduction Positive Results Conclusion Signatures Encryption Schemes

Proof

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-48
SLIDE 48

Introduction Positive Results Conclusion Signatures Encryption Schemes

GPV Reduction

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-49
SLIDE 49

Introduction Positive Results Conclusion Signatures Encryption Schemes

Modified GPV Reduction

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-50
SLIDE 50

Introduction Positive Results Conclusion Signatures Encryption Schemes

History-Freeness of GPV Reduction

This reduction is in history-free form!

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-51
SLIDE 51

Introduction Positive Results Conclusion Signatures Encryption Schemes

History-Freeness of GPV Reduction

This reduction is in history-free form! Caveats: fpk(r) for random r is NOT truly random for GPV construction. GPV signatures are NOT truly random preimages of O(m)

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-52
SLIDE 52

Introduction Positive Results Conclusion Signatures Encryption Schemes

History-Freeness of GPV Reduction

This reduction is in history-free form! Caveats: fpk(r) for random r is NOT truly random for GPV construction. GPV signatures are NOT truly random preimages of O(m) Need to relax definition of history freeness to allow indistinguishable (by quantum adversaries)

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-53
SLIDE 53

Introduction Positive Results Conclusion Signatures Encryption Schemes

Other History-Free Reductions

Full Domain Hash from claw-free permutations ([Cor00]). Katz-Wang Signatures (KW03)

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-54
SLIDE 54

Introduction Positive Results Conclusion Signatures Encryption Schemes

Encryption

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-55
SLIDE 55

Introduction Positive Results Conclusion Signatures Encryption Schemes

Encryption

History-freeness complicated by the challenge query. Easier to prove directly.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-56
SLIDE 56

Introduction Positive Results Conclusion Signatures Encryption Schemes

Encryption

History-freeness complicated by the challenge query. Easier to prove directly. CPA-security of Bellare-Rogaway encryption scheme ([BR93]): Epk(m) = fpk(r)||m ⊕ O(r) for a random r where f is a trapdoor permutation.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-57
SLIDE 57

Introduction Positive Results Conclusion Signatures Encryption Schemes

Encryption

History-freeness complicated by the challenge query. Easier to prove directly. CPA-security of Bellare-Rogaway encryption scheme ([BR93]): Epk(m) = fpk(r)||m ⊕ O(r) for a random r where f is a trapdoor permutation. CCA-security of hybrid encryption scheme: Epk(m) = fpk(r)|| (ES)O(r) (m) for a random r where f is a trapdoor permutation and ES is CCA-secure private key encryption.

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-58
SLIDE 58

Introduction Positive Results Conclusion Conclusion Open Problems

Conclusion

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-59
SLIDE 59

Introduction Positive Results Conclusion Conclusion Open Problems

Conclusion

Classical security reductions do not carry over to the quantum world

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-60
SLIDE 60

Introduction Positive Results Conclusion Conclusion Open Problems

Conclusion

Classical security reductions do not carry over to the quantum world Restricted class of classical security proofs do imply quantum security

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-61
SLIDE 61

Introduction Positive Results Conclusion Conclusion Open Problems

Conclusion

Classical security reductions do not carry over to the quantum world Restricted class of classical security proofs do imply quantum security GPV Signatures are secure

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-62
SLIDE 62

Introduction Positive Results Conclusion Conclusion Open Problems

Open Problems

Generic Full Domain Hash

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-63
SLIDE 63

Introduction Positive Results Conclusion Conclusion Open Problems

Open Problems

Generic Full Domain Hash Signatures from Identification Protocols [FS86]

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-64
SLIDE 64

Introduction Positive Results Conclusion Conclusion Open Problems

Open Problems

Generic Full Domain Hash Signatures from Identification Protocols [FS86] CCA-security from weaker security notions [FO99]

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World

slide-65
SLIDE 65

Introduction Positive Results Conclusion Conclusion Open Problems

Open Problems

Generic Full Domain Hash Signatures from Identification Protocols [FS86] CCA-security from weaker security notions [FO99] Quantum PRFs from one-way functions

Boneh, Dagdelen, Fischlin, Lehmann, Schaffner, Zhandry Random Oracles in a Quantum World