YoVDO

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Quantum Computing Courses Security Models Courses Random Oracle Model Courses

Course Description

Overview

Explore a conference talk from PKC 2020 examining Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Delve into the limitations of previous work, the significance of decryption failures, and the transition from the Random Oracle Model to the Quantum Random Oracle Model. Understand the 'Oneway to Hiding' technique for extracting preimages, and examine common elements in Fujisaki-Okamoto proofs. Investigate the security challenges of 2-move protocols and gain insights into the proposed security model. Conclude by considering open questions in this field of cryptographic research.

Syllabus

Intro
Context: NIST 'competition
Prior work on AKE without signatures
Outline
Limitations of the original work
The importance of decryption failures
Random Oracle Model (ROM)
Quantum Random Oracle Model (QROM)
Extracting preimages with 'Oneway to Hiding
Overview: Common ground of all current FO proofs
Transformation T
Transformation U
Simplified overview. Subsequent CCA bounds
Our setting: 2-move protocols
Attacking 2-move protocols
Our security model
Security of our protocol (Intuition)
Open questions


Taught by

TheIACR

Related Courses

Intro to Computer Science
University of Virginia via Udacity
Quantum Mechanics for IT/NT/BT
Korea University via Open Education by Blackboard
Emergent Phenomena in Science and Everyday Life
University of California, Irvine via Coursera
Quantum Information and Computing
Indian Institute of Technology Bombay via Swayam
Quantum Computing
Indian Institute of Technology Kanpur via Swayam