{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T17:11:48Z","timestamp":1775754708372,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032226945","type":"print"},{"value":"9783032226952","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22695-2_2","type":"book-chapter","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:29:45Z","timestamp":1775752185000},"page":"37-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generic Composition: From Classical to\u00a0Quantum Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2768-9878","authenticated-orcid":false,"given":"Nathalie","family":"Lang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0359-3680","authenticated-orcid":false,"given":"Jannis","family":"Leuther","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4906-5131","authenticated-orcid":false,"given":"Stefan","family":"Lucks","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Alagic, G., Gagliardoni, T., Majenz, C.: Unforgeable quantum encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 489\u2013519. Springer (2018)","DOI":"10.1007\/978-3-319-78372-7_16"},{"key":"2_CR2","unstructured":"Alagic, G., Majenz, C., Russell, A., Song, F.: Quantum-secure message authentication via blind-unforgeability. IACR Cryptol. ePrint Arch. 1150 (2018). https:\/\/eprint.iacr.org\/2018\/1150"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Alagic, G., Majenz, C., Russell, A., Song, F.: Quantum-access-secure message authentication via blind-unforgeability. In: Advances in Cryptology\u2013EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10\u201314 May 2020, Proceedings, Part III 39, pp. 788\u2013817. Springer (2020)","DOI":"10.1007\/978-3-030-45727-3_27"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Ambainis, A., Hamburg, M., Unruh, D.: Quantum security proofs using semi-classical oracles. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18\u201322 August 2019, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11693, pp. 269\u2013295. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_10","DOI":"10.1007\/978-3-030-26951-7_10"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Anand, M.V., Targhi, E.E., Tabia, G.N., Unruh, D.: Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. In: Takagi, T. (ed.) Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, 24\u201326 February 2016, Proceedings. Lecture Notes in Computer Science, vol.\u00a09606, pp. 44\u201363. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_4","DOI":"10.1007\/978-3-319-29360-8_4"},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: 38th Annual Symposium on Foundations of Computer Science, FOCS \u201997, Miami Beach, Florida, USA, 19\u201322 October 1997, pp. 394\u2013403. IEEE Computer Society (1997). https:\/\/doi.org\/10.1109\/SFCS.1997.646128","DOI":"10.1109\/SFCS.1997.646128"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 531\u2013545. Springer (2000)","DOI":"10.1007\/3-540-44448-3_41"},{"issue":"4","key":"2_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s00145-008-9026-x","volume":"21","author":"M Bellare","year":"2008","unstructured":"Bellare, M., Namprempre, C.: Authenticated encryption: relations among notions and analysis of the generic composition paradigm. J. Cryptol. 21(4), 469\u2013491 (2008)","journal-title":"J. Cryptol."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Bhaumik, R., et al.: QCB: efficient quantum-secure authenticated encryption. In: Advances in Cryptology\u2013ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 6\u201310 December 2021, Proceedings, Part I 27, pp. 668\u2013698. Springer (2021)","DOI":"10.1007\/978-3-030-92062-3_23"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Quantum-secure message authentication codes. In: Advances in Cryptology\u2013EUROCRYPT 2013: 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, 26\u201330 May 2013. Proceedings 32, pp. 592\u2013608. Springer (2013)","DOI":"10.1007\/978-3-642-38348-9_35"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Secure signatures and chosen ciphertext security in a quantum computing world. In: Advances in Cryptology\u2013CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, 18\u201322 August 2013. Proceedings, Part II, pp. 361\u2013379. Springer (2013)","DOI":"10.1007\/978-3-642-40084-1_21"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Bonnetain, X., Leurent, G., Naya-Plasencia, M., Schrottenloher, A.: Quantum linearization attacks. In: Advances in Cryptology\u2013ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 6\u201310 December 2021, Proceedings, Part I 27, pp. 422\u2013452. Springer (2021)","DOI":"10.1007\/978-3-030-92062-3_15"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Carstens, T.V., Ebrahimi, E., Tabia, G.N., Unruh, D.: Relationships between quantum IND-CPA notions. In: Theory of Cryptography Conference, pp. 240\u2013272. Springer (2021)","DOI":"10.1007\/978-3-030-90459-3_9"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Chevalier, C., Ebrahimi, E., Vu, Q.: On security notions for encryption in a quantum world. In: Isobe, T., Sarkar, S. (eds.) Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, 11\u201314 December 2022, Proceedings. Lecture Notes in Computer Science, vol. 13774, pp. 592\u2013613. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-22912-1_26","DOI":"10.1007\/978-3-031-22912-1_26"},{"key":"2_CR15","unstructured":"Chevalier, C., Ebrahimi, E., Vu, Q.: On the security notions for encryption in a quantum world (revision 2022-09-03). IACR Cryptol. ePrint Arch. 237 (2022). https:\/\/eprint.iacr.org\/2020\/237"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271\u2013272 (1982). https:\/\/doi.org\/10.1016\/0375-9601(82)90084-6. https:\/\/www.sciencedirect.com\/science\/article\/pii\/0375960182900846","DOI":"10.1016\/0375-9601(82)90084-6"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Gagliardoni, T., H\u00fclsing, A., Schaffner, C.: Semantic security and indistinguishability in the quantum world. In: Advances in Cryptology\u2013CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14\u201318 August 2016, Proceedings, Part III 36, pp. 60\u201389. Springer (2016)","DOI":"10.1007\/978-3-662-53015-3_3"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Hosoyamada, A., Iwata, T.: On tight quantum security of HMAC and NMAC in the quantum random oracle model. In: Malkin, T., Peikert, C. (eds.) Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, 16\u201320 August 2021, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12825, pp. 585\u2013615. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-84242-0_21","DOI":"10.1007\/978-3-030-84242-0_21"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Kaplan, M., Leurent, G., Leverrier, A., Naya-Plasencia, M.: Breaking symmetric cryptosystems using quantum period finding. In: Advances in Cryptology\u2013CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14\u201318 August 2016, Proceedings, Part II 36, pp. 207\u2013237. Springer (2016)","DOI":"10.1007\/978-3-662-53008-5_8"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Lang, N., Lucks, S.: On the post-quantum security of classical authenticated encryption schemes. In: Mrabet, N.E., Feo, L.D., Duquesne, S. (eds.) Progress in Cryptology - AFRICACRYPT 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, 19\u201321 July 2023, Proceedings. Lecture Notes in Computer Science, vol. 14064, pp. 79\u2013104. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-37679-5_4","DOI":"10.1007\/978-3-031-37679-5_4"},{"key":"2_CR21","unstructured":"Mossayebi, S., Schack, R.: Concrete security against adversaries with quantum superposition access to encryption and decryption oracles. arXiv preprint arXiv:1609.03780 (2016)"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: Atluri, V. (ed.) Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, 18\u201322 November 2002, pp. 98\u2013107. ACM (2002). https:\/\/doi.org\/10.1145\/586110.586125","DOI":"10.1145\/586110.586125"},{"key":"2_CR23","doi-asserted-by":"publisher","unstructured":"Rogaway, P.: Nonce-based symmetric encryption. In: Roy, B.K., Meier, W. (eds.) Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, 5\u20137 February 2004, Revised Papers. Lecture Notes in Computer Science, vol.\u00a03017, pp. 348\u2013359. Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-25937-4_22","DOI":"10.1007\/978-3-540-25937-4_22"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Song, F., Yun, A.: Quantum security of NMAC and related constructions - PRF domain extension against quantum attacks. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20\u201324 August 2017, Proceedings, Part II. Lecture Notes in Computer Science, vol. 10402, pp. 283\u2013309. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-63715-0_10","DOI":"10.1007\/978-3-319-63715-0_10"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Soukharev, V., Jao, D., Seshadri, S.: Post-quantum security models for authenticated encryption. In: Takagi, T. (ed.) Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, 24\u201326 February 2016, Proceedings. Lecture Notes in Computer Science, vol.\u00a09606, pp. 64\u201378. Springer (2016). https:\/\/doi.org\/10.1007\/978-3-319-29360-8_5","DOI":"10.1007\/978-3-319-29360-8_5"},{"key":"2_CR26","unstructured":"Unruh, D.: Compressed permutation oracles (and the collision-resistance of sponge\/sha3). IACR Cryptol. ePrint Arch. 62 (2021). https:\/\/eprint.iacr.org\/2021\/062"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Wootters, W.K., Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802\u2013803 (1982). https:\/\/api.semanticscholar.org\/CorpusID:4339227","DOI":"10.1038\/299802a0"},{"key":"2_CR28","unstructured":"Zhandry, M.: A note on the quantum collision and set equality problems. arXiv preprint arXiv:1312.1027 (2013)"},{"key":"2_CR29","doi-asserted-by":"publisher","unstructured":"Zhandry, M.: How to record quantum queries, and applications to quantum indifferentiability. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, 18\u201322 August 2019, Proceedings, Part II. Lecture Notes in Computer Science, vol. 11693, pp. 239\u2013268. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_9","DOI":"10.1007\/978-3-030-26951-7_9"},{"key":"2_CR30","doi-asserted-by":"publisher","unstructured":"Zhandry, M.: How to construct quantum random functions. J. ACM 68(5), 33:1\u201333:43 (2021). https:\/\/doi.org\/10.1145\/3450745","DOI":"10.1145\/3450745"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22695-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T16:29:50Z","timestamp":1775752190000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22695-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032226945","9783032226952"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22695-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"10 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint-Malo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}