Abstract
To investigate the security of cryptographic protocols against quantum adversary, researchers have extended classical random oracle models with the help of post-quantum cryptography and quantum cryptography into the quantum random oracle models. This paper summarizes the research progress across various random oracle models, categorizing their concepts, instantiation methods, and security proof techniques to systematically review random oracle models against quantum adversaries. It also offered security analyses of cryptographic protocols under different quantum random oracle models. A comparative study of quantum-accessible random oracle model, quantum random oracle model, and classical random oracle model is carried out to clarify the differences and relationships between various random oracle models. Furthermore, the paper points out future research directions and trends with the goal to address the threats posed by quantum computing.
| Translated title of the contribution | A Survey of Random Oracle Model against Quantum Adversary |
|---|---|
| Original language | Chinese (Traditional) |
| Pages (from-to) | 1-10 |
| Number of pages | 10 |
| Journal | Beijing Youdian Xueyuan Xuebao/Journal of Beijing University of Posts And Telecommunications |
| Volume | 47 |
| Issue number | 6 |
| DOIs | |
| State | Published - Dec 2024 |
Fingerprint
Dive into the research topics of 'A Survey of Random Oracle Model against Quantum Adversary'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver