In the first part of the paper, we show a generic compiler that transforms any oracle algorithm that can query multiple oracles adaptively, i.e., can decide on which oracle to query at what point dependent on previous oracle responses, into a static algorithm that fixes these choices at the beginning of the execution. Compared to naive ways of achieving this, our compiler controls the blow-up in query complexity for each oracle individually, and causes a very mild blow-up only. In the second part of the paper, we use our compiler to show the security of the very efficient hash-based split-key PRF proposed by Giacon, Heuer and Poettering (PKC 2018), in the quantum random-oracle model. Using a split-key PRF as the key-derivation function gives rise to a secure KEM combiner. Thus, our result shows that the hash-based construction of Giacon et al. can be safely used in the context of quantum attacks, for instance to combine a well-established but only classically-secure KEM with a candidate KEM that is believed to be quantum-secure. Our security proof for the split-key PRF crucially relies on our adaptive-to-static compiler, but we expect our compiler to be useful beyond this particular application. Indeed, we discuss a couple of other, known results from the literature that would have profitted from our compiler, in that these works had to go though serious complications in order to deal with adaptivity.
翻译:在文件的第一部分,我们展示了一个通用的编译器,将任何能够适应性地查询多种神器的神器算法转换成一个能够根据以前神器的反应在哪个点上查询的神器,从而在处决开始时将这些选择固定起来的静态算法。与天真的方法相比,我们的编译器控制了每个神器的质询复杂性,并只造成非常温和的打击。在文件的第二部分,我们使用我们的编译器来显示Giacon、Heuer和Poettering(PKC 2018)在量子随机机动模型中提议的非常高效的基于散装的散装钥匙 PRF 的安全性。使用一个支离破碎的PRF 功能来修正这些选择。因此,我们的结果显示,在数量攻击中可以安全地使用Giacon et al. 。 例如,我们使用我们的编译器将一个已经建立良好但只有经典安全的KEM 和一位候选人的KEMEM 交易(PKEM 2018) 的安全性文件 的安全性结合起来,我们相信, 将我们的安全性地重新编篡改编译成一个我们的安全性的文件。