Random Oracles in a Quantum World

@article{Boneh2010RandomOI,
  title={Random Oracles in a Quantum World},
  author={Dan Boneh and {\"O}zg{\"u}r Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner and Mark Zhandry},
  journal={IACR Cryptology ePrint Archive},
  year={2010},
  volume={2010},
  pages={428}
}
The interest in post-quantum cryptography — classical systems that remain secure in the presence of a quantum adversary — has generated elegant proposals for new cryptosystems. Some of these systems are set in the random oracle model and are proven secure relative to adversaries that have classical access to the random oracle. We argue that to prove post-quantum security one needs to prove security in the quantum-accessible random oracle model where the adversary can query the random oracle… CONTINUE READING
Highly Influential
This paper has highly influenced 10 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 156 citations. REVIEW CITATIONS
Related Discussions
This paper has been referenced on Twitter 1 time. VIEW TWEETS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 95 extracted citations

Post-Quantum Cryptography

Lecture Notes in Computer Science • 2017
View 20 Excerpts
Highly Influenced

Advances in Cryptology – ASIACRYPT 2017

Lecture Notes in Computer Science • 2017
View 10 Excerpts
Highly Influenced

Cryptographic Hardware and Embedded Systems – CHES 2017

Lecture Notes in Computer Science • 2017
View 10 Excerpts
Highly Influenced

Improved identification protocol in the quantum random oracle model

Int. Arab J. Inf. Technol. • 2017
View 6 Excerpts
Highly Influenced

Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model

IACR Cryptology ePrint Archive • 2017
View 4 Excerpts
Highly Influenced

Post-Quantum Cryptography

Lecture Notes in Computer Science • 2018
View 5 Excerpts
Highly Influenced

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

ACM Conference on Computer and Communications Security • 2017
View 3 Excerpts
Highly Influenced

157 Citations

0204060'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 157 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…