In the first part of the paper, we show a generic compiler that transforms any oracle algorithm that can query multiple oracles *adaptively*, i.e., can decide on *which* oracle to query at what point dependent on previous oracle responses, into a *static* algorithm that fixes these choices at the beginning of the execution. Compared to naive ways of achieving this, our compiler controls the blow-up in query complexity for each oracle *individually*, and causes a very mild blow-up only. In the second part of the paper, we use our compiler to show the security of the very efficient hash-based *split-key PRF* proposed by Giacon, Heuer and Poettering (PKC~2018), in the *quantum* random-oracle model. Using a split-key PRF as the key-derivation function gives rise to a secure KEM combiner. Thus, our result shows that the hash-based construction of Giacon et al. can be safely used in the context of quantum attacks, for instance to combine a well-established but only classically-secure KEM with a candidate KEM that is believed to be quantum-secure. Our security proof for the split-key PRF crucially relies on our adaptive-to-static compiler, but we expect our compiler to be useful beyond this particular application. Indeed, we discuss a couple of other, known results from the literature that would have profitted from our compiler, in that these works had to go though serious complications in oder to deal with adaptivity.
翻译:在文件的第一部分,我们展示了一个通用的编译器,它可以将任何能够查询多种神器的神器算法转换为可以查询多个神器*,也就是说,我们可以在文件的第二部分,我们用我们的编译器来显示在Giacon、Heuer和Poferting提出的非常高效的哈希基 PRF* (PKC~2018) 的非常高效的利差计算法的安全性,这取决于先前的神器反应的哪一点,可以在执行开始的时候修正这些选择。相比于实现这一点的天真的方法,我们的编译器可以控制每个神器* 的调试复杂度,并且只造成非常温和的打击。因此,我们的编译器在文件的第二部分,我们使用我们的纸质和纸质的纸质结构, 并且从我们所基于的纸质的纸质和纸质的工程的构造可以安全地用来显示非常高效的复杂性变现结果。