Post-quantum security of hash functions
| Authors | |
|---|---|
| Supervisors | |
| Award date | 18-01-2022 |
| ISBN |
|
| Series | ILLC dissertation series, DS-2022-02 |
| Number of pages | 281 |
| Publisher | Amsterdam: Institute for Logic, Language and Computation |
| Organisations |
|
| Abstract |
The research covered in this thesis is dedicated to provable post-quantum security of hash functions. Post-quantum security provides security guarantees against quantum attackers. We focus on analyzing the sponge construction, a cryptographic construction used in the standardized hash function SHA3.
Our main results are proving a number of quantum security statements. These include standard-model security: collision-resistance and collapsingness, and more idealized notions such as indistinguishability and indifferentiability from a random oracle. All these results concern quantum security of the classical cryptosystems. From a more high-level perspective we find new applications and generalize several important proof techniques in post-quantum cryptography. We use the polynomial method to prove quantum indistinguishability of the sponge construction. We also develop a framework for quantum game-playing proofs, using the recently introduced techniques of compressed random oracles and the One-way-To-Hiding lemma. To establish the usefulness of the new framework we also prove a number of quantum indifferentiability results for other cryptographic constructions. On the way to these results, though, we address an open problem concerning quantum indifferentiability. Namely, we disprove a conjecture that forms the basis of a no-go theorem for a version of quantum indifferentiability. |
| Document type | PhD thesis |
| Language | English |
| Downloads | |
| Permalink to this page | |
