Makana Castillo-Martin - Profile on Academia.edu (original) (raw)

Jelle Don related author profile picture

Serge Fehr related author profile picture

Marc Fischlin related author profile picture

Siamak F Shahandashti related author profile picture

Rei Safavi-naini related author profile picture

sree vivek related author profile picture

Changshe Ma related author profile picture

Mark Manulis related author profile picture

Yuh-Min Tseng related author profile picture

Jayaprakash Kar related author profile picture

Uploads

Papers by Makana Castillo-Martin

Research paper thumbnail of Survey on the Security of the Quantum ROM

The Random Oracle Model (ROM) is a heuristic that has been used to prove the security of hundreds... more The Random Oracle Model (ROM) is a heuristic that has been used to prove the security of hundreds of cryptographic protocols. For over 25 years, it has been used to prove the security of protocols that would otherwise be far more complicated, or even admit no security proof at all. However, since this proof technique is only a heuristic, there is a gap between the notion of security in the ROM and security in in the real world. Over time, the arguments that attempt to bridge this philosophical gap have, in our opinion, become quite strong. In this paper, we aim to enumerate the arguments in favor of the real-world security of cryptographic schemes proven secure in the ROM, and “port” them to an analogous heuristic, the Quantum Random Oracle Model (QROM), which makes claims about security of schemes against quantum adversaries. The existence of a philosophical argument bridging security in the QROM and security in the real world is similarly important: the QROM has already been used ...

Research paper thumbnail of Survey on the Security of the Quantum ROM

The Random Oracle Model (ROM) is a heuristic that has been used to prove the security of hundreds... more The Random Oracle Model (ROM) is a heuristic that has been used to prove the security of hundreds of cryptographic protocols. For over 25 years, it has been used to prove the security of protocols that would otherwise be far more complicated, or even admit no security proof at all. However, since this proof technique is only a heuristic, there is a gap between the notion of security in the ROM and security in in the real world. Over time, the arguments that attempt to bridge this philosophical gap have, in our opinion, become quite strong. In this paper, we aim to enumerate the arguments in favor of the real-world security of cryptographic schemes proven secure in the ROM, and “port” them to an analogous heuristic, the Quantum Random Oracle Model (QROM), which makes claims about security of schemes against quantum adversaries. The existence of a philosophical argument bridging security in the QROM and security in the real world is similarly important: the QROM has already been used ...

Log In