Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a conference talk from PKC 2020 examining Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Delve into the limitations of previous work, the significance of decryption failures, and the transition from the Random Oracle Model to the Quantum Random Oracle Model. Understand the 'Oneway to Hiding' technique for extracting preimages, and examine common elements in Fujisaki-Okamoto proofs. Investigate the security challenges of 2-move protocols and gain insights into the proposed security model. Conclude by considering open questions in this field of cryptographic research.
Syllabus
Intro
Context: NIST 'competition
Prior work on AKE without signatures
Outline
Limitations of the original work
The importance of decryption failures
Random Oracle Model (ROM)
Quantum Random Oracle Model (QROM)
Extracting preimages with 'Oneway to Hiding
Overview: Common ground of all current FO proofs
Transformation T
Transformation U
Simplified overview. Subsequent CCA bounds
Our setting: 2-move protocols
Attacking 2-move protocols
Our security model
Security of our protocol (Intuition)
Open questions
Taught by
TheIACR
Related Courses
Threshold ECDSA from ECDSA Assumptions - The Multiparty CaseIEEE via YouTube Introduction to Cryptography Part 2 of 3 - IPAM at UCLA
Institute for Pure & Applied Mathematics (IPAM) via YouTube Random Oracle Models in Cryptography - Session 1
TheIACR via YouTube Random Oracle Models and Combiners - Crypto 2023 Session 2
TheIACR via YouTube Lattice Cryptography: What Happened and What's Next
TheIACR via YouTube