Generic Authenticated Key Exchange in the Quantum Random Oracle Model

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

TheIACR via YouTube Direct link

Prior work on AKE without signatures

3 of 18

3 of 18

Prior work on AKE without signatures

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Context: NIST 'competition
  3. 3 Prior work on AKE without signatures
  4. 4 Outline
  5. 5 Limitations of the original work
  6. 6 The importance of decryption failures
  7. 7 Random Oracle Model (ROM)
  8. 8 Quantum Random Oracle Model (QROM)
  9. 9 Extracting preimages with 'Oneway to Hiding
  10. 10 Overview: Common ground of all current FO proofs
  11. 11 Transformation T
  12. 12 Transformation U
  13. 13 Simplified overview. Subsequent CCA bounds
  14. 14 Our setting: 2-move protocols
  15. 15 Attacking 2-move protocols
  16. 16 Our security model
  17. 17 Security of our protocol (Intuition)
  18. 18 Open questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.