The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tight and conceptually simple proofs where provable security in the standard model is elusive or costly. While being the adequate replacement of the ROM in the post-quantum security setting, the quantum-accessible random oracle model (QROM) has thus far failed to provide these advantages in many settings. In this work, we focus on adaptive reprogrammability, a feature of the ROM enabling tight and simple proofs in many settings. We show that the straightforward quantum-accessible generalization of adaptive reprogramming is feasible by proving a bound on the adversarial advantage in distinguishing whether a random oracle has been reprogrammed or not. We show that our bound is tight by providing a matching attack. We go on to demonstrate that our technique recovers the mentioned advantages of the ROM in three QROM applications: 1) We give a tighter proof of security of the message compression routine as used by XMSS. 2) We show that the standard ROM proof of chosen-message security for Fiat-Shamir signatures can be lifted to the QROM, straightforwardly, achieving a tighter reduction than previously known. 3) We give the first QROM proof of security against fault injection and nonce attacks for the hedged Fiat-Shamir transform.
翻译:随机神器模型(ROM)广受欢迎,这主要是因为它往往允许严格和概念简单的证据,而标准模型中可证实的安全是难以实现的或代价高昂的; 量子存取随机神器模型(QROM)在量子存取随机神器模型(QROM)的恰当替换后,迄今为止在许多环境中未能提供这些优势; 在这项工作中,我们侧重于适应性重新编程,这是ROM在许多环境中能够提供严格和简单证据的一个特点; 我们表明,在区分随机神器是否已经重新编程的对抗优势方面,直接的、可获取的、可获取的适应性重新编程的简易证据是可行的; 我们证明,在区分随机神器是否已被重新编程时,对准的重新编程优势加以约束是可行的; 我们表明,虽然量子存取的随机神器模型(QROM)迄今为止没有提供相应的攻击,但我们的技术恢复了在三种QROM应用程序中提及的ROM的优点:(1) 我们更严格地证明了XMSS所使用的信息压缩程序的安全性;(2) 我们表明,对于Fat-Shamir签字选择的安全标准证明,可以比我们更严格地证明。