Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Generic Authenticated Key Exchange in the Quantum Random Oracle Model

TheIACR via YouTube

Overview

Explore a conference talk from PKC 2020 examining Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Delve into the limitations of previous work, the significance of decryption failures, and the transition from the Random Oracle Model to the Quantum Random Oracle Model. Understand the 'Oneway to Hiding' technique for extracting preimages, and examine common elements in Fujisaki-Okamoto proofs. Investigate the security challenges of 2-move protocols and gain insights into the proposed security model. Conclude by considering open questions in this field of cryptographic research.

Syllabus

Intro
Context: NIST 'competition
Prior work on AKE without signatures
Outline
Limitations of the original work
The importance of decryption failures
Random Oracle Model (ROM)
Quantum Random Oracle Model (QROM)
Extracting preimages with 'Oneway to Hiding
Overview: Common ground of all current FO proofs
Transformation T
Transformation U
Simplified overview. Subsequent CCA bounds
Our setting: 2-move protocols
Attacking 2-move protocols
Our security model
Security of our protocol (Intuition)
Open questions

Taught by

TheIACR

Reviews

Start your review of Generic Authenticated Key Exchange in the Quantum Random Oracle Model

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.