Completed
Random Oracle Model (ROM)
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Generic Authenticated Key Exchange in the Quantum Random Oracle Model
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Context: NIST 'competition
- 3 Prior work on AKE without signatures
- 4 Outline
- 5 Limitations of the original work
- 6 The importance of decryption failures
- 7 Random Oracle Model (ROM)
- 8 Quantum Random Oracle Model (QROM)
- 9 Extracting preimages with 'Oneway to Hiding
- 10 Overview: Common ground of all current FO proofs
- 11 Transformation T
- 12 Transformation U
- 13 Simplified overview. Subsequent CCA bounds
- 14 Our setting: 2-move protocols
- 15 Attacking 2-move protocols
- 16 Our security model
- 17 Security of our protocol (Intuition)
- 18 Open questions