<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Andreas Hülsing | LIP6 - Équipe QI</title><link>https://qi.lip6.fr/fr/people/andreas-hulsing/</link><atom:link href="https://qi.lip6.fr/fr/people/andreas-hulsing/index.xml" rel="self" type="application/rss+xml"/><description>Andreas Hülsing</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>fr</language><copyright>© 2022 LIP6 Quantum Information Team</copyright><lastBuildDate>Mon, 06 Dec 2021 00:00:00 +0000</lastBuildDate><image><url>https://qi.lip6.fr/media/icon_hudf2fdaa51677944daa4f50609104ef9a_13950_512x512_fill_lanczos_center_3.png</url><title>Andreas Hülsing</title><link>https://qi.lip6.fr/fr/people/andreas-hulsing/</link></image><item><title>Tight adaptive reprogramming in the QROM</title><link>https://qi.lip6.fr/fr/publication/2997744-tight-adaptive-reprogramming-in-the-qrom/</link><pubDate>Mon, 06 Dec 2021 00:00:00 +0000</pubDate><guid>https://qi.lip6.fr/fr/publication/2997744-tight-adaptive-reprogramming-in-the-qrom/</guid><description>&lt;p>The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tight and conceptually simple proofs where provable security in the standard model is elusive or costly. While being the adequate replacement of the ROM in the post-quantum security setting, the quantum-accessible random oracle model (QROM) has thus far failed to provide these advantages in many settings. In this work, we focus on adaptive reprogrammability, a feature of the ROM enabling tight and simple proofs in many settings. We show that the straightforward quantum-accessible generalization of adaptive reprogramming is feasible by proving a bound on the adversarial advantage in distinguishing whether a random oracle has been reprogrammed or not. We show that our bound is tight by providing a matching attack. We go on to demonstrate that our technique recovers the mentioned advantages of the ROM in three QROM applications: 1) We give a tighter proof of security of the message compression routine as used by XMSS. 2) We show that the standard ROM proof of chosen-message security for Fiat-Shamir signatures can be lifted to the QROM, straightforwardly, achieving a tighter reduction than previously known. 3) We give the first QROM proof of security against fault injection and nonce attacks for the hedged Fiat-Shamir transform.&lt;/p></description></item></channel></rss>