In the first part of the paper, we show a generic compiler that transforms any oracle algorithm that can query multiple oracles {\em adaptively}, i.e., can decide on {\em which} oracle to query at what point dependent on previous oracle responses, into a {\em static} algorithm that fixes these choices at the beginning of the execution. Compared to naive ways of achieving this, our compiler controls the blow-up in query complexity for each oracle {\em individually}, and causes a very mild blow-up only. In the second part of the paper, we use our compiler to show the security of the very efficient hash-based {\em split-key PRF} proposed by Giacon, Heuer and Poettering (PKC~2018), in the {\em quantum} random-oracle model. Using a split-key PRF as the key-derivation function gives rise to a secure KEM combiner. Thus, our result shows that the hash-based construction of Giacon {\em et al.}\ can be safely used in the context of quantum attacks, for instance to combine a well-established but only classically-secure KEM with a candidate KEM that is believed to be quantum-secure. Our security proof for the split-key PRF crucially relies on our adaptive-to-static compiler, but we expect our compiler to be useful beyond this particular application. Indeed, we discuss a couple of other, known results from the literature that would have profitted from our compiler, in that these works had to go though serious complications in oder to deal with adaptivity.
翻译:在文件的第一部分,我们展示了一个通用的编译器,它可以将任何能够查询多个神器的神器算法转换成一个能够转换到每个神器的质询复杂度,并且只能造成非常轻微的打击。在文件的第二部分,我们用我们的文献编译器来显示由Giacon、Heuer和Poettering(PKC~2018)提出的非常高效的基于散开的散开键 PRF}在哪个点取决于先前的神器反应,在开始执行时将这些选择变成一个固定的算法。相比于实现这一点的天真的方法,我们的编译器将控制每个神器的质质质质询复杂度的打击。因此,我们的结果显示,在文件的第二部分,我们用我们的纸质交易的基于散开式协议的构造来展示非常高效的基于散开的散开键盘的PRF 安全性, 并且我们从我们所知道的纸质攻击的可靠度上可以安全地使用一个我们所知道的直径的直径直达的直径直径的直径的直径对准的KEM的直径直径对准的直径对准的直路路的直路。