{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:14:37Z","timestamp":1742930077271,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819609468"},{"type":"electronic","value":"9789819609475"}],"license":[{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T00:00:00Z","timestamp":1733702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0947-5_6","type":"book-chapter","created":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T04:27:34Z","timestamp":1733632054000},"page":"158-184","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improved Quantum Lifting by\u00a0Coherent Measure-and-Reprogram"],"prefix":"10.1007","author":[{"given":"Alexandru","family":"Cojocaru","sequence":"first","affiliation":[]},{"given":"Juan","family":"Garay","sequence":"additional","affiliation":[]},{"given":"Qipeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Amit Agarwal, James Bartusek, Dakshita Khurana, and Nishant Kumar. A new framework for quantum oblivious transfer. In Carmit Hazay and Martijn Stam, editors, Advances in Cryptology \u2013 EUROCRYPT 2023, pages 363\u2013394, Cham, 2023. Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-30545-0_13"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Thomas Attema, Serge Fehr, and Michael Kloo\u00df. Fiat-shamir transformation of multi-round interactive proofs. In Eike Kiltz and Vinod Vaikuntanathan, editors, Theory of Cryptography, pages 113\u2013142, Cham, 2022. Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-22318-1_5"},{"key":"6_CR3","unstructured":"Thomas Attema, Serge Fehr, Michael Kloo\u00df, and Nicolas Resch. The fiat\u2013shamir transformation of $$(\\gamma _1,\\dots ,\\gamma _\\mu )$$-special-sound interactive proofs. Cryptology ePrint Archive, Paper 2023\/1945, 2023. https:\/\/eprint.iacr.org\/2023\/1945."},{"issue":"5","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"CH Bennett","year":"1997","unstructured":"Charles\u00a0H. Bennett, Ethan Bernstein, Gilles Brassard, and Umesh Vazirani. Strengths and weaknesses of quantum computing. SIAM J. Comput., 26(5):1510\u20131523, 1997.","journal-title":"SIAM J. Comput."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Dan Boneh, \u00d6zg\u00fcr Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. Random oracles in a quantum world. In Dong\u00a0Hoon Lee and Xiaoyun Wang, editors, Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings, volume 7073 of Lecture Notes in Computer Science, pages 41\u201369. Springer, 2011.","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Nir Bitansky, Michael Kellner, and Omri Shmueli. Post-quantum resettably-sound zero knowledge. In Kobbi Nissim and Brent Waters, editors, Theory of Cryptography, pages 62\u201389, Cham, 2021. Springer International Publishing.","DOI":"10.1007\/978-3-030-90459-3_3"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Mihir Bellare and Phillip Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 62\u201373, 1993.","DOI":"10.1145\/168588.168596"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"944","DOI":"10.22331\/q-2023-03-09-944","volume":"7","author":"A Cojocaru","year":"2023","unstructured":"Alexandru Cojocaru, Juan Garay, Aggelos Kiayias, Fang Song, and Petros Wallden. Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin\u2019s Post-Quantum Security. Quantum, 7:944, March 2023.","journal-title":"Quantum"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Kai-Min Chung, Siyao Guo, Qipeng Liu, and Luowen Qian. Tight quantum time-space tradeoffs for function inversion. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 673\u2013684. IEEE, 2020.","DOI":"10.1109\/FOCS46700.2020.00068"},{"key":"6_CR10","unstructured":"Andr\u00e9 Chailloux. Tight quantum security of the fiat-shamir transform for commit-and-open identification schemes with applications to post-quantum signature schemes. Cryptology ePrint Archive, Paper 2019\/699, 2019. https:\/\/eprint.iacr.org\/2019\/699."},{"key":"6_CR11","unstructured":"Jelle Don, Serge Fehr, Yu-Hsuan Huang, and Patrick Struck. On the (in)security of the buff transform. Cryptology ePrint Archive, Paper 2023\/1634, 2023. https:\/\/eprint.iacr.org\/2023\/1634."},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Jelle Don, Serge Fehr, and Christian Majenz. The Measure-and-Reprogram Technique 2.0: Multi-round Fiat-Shamir and More, page 602-631. Springer International Publishing, 2020.","DOI":"10.1007\/978-3-030-56877-1_21"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner. Security of the fiat-shamir transformation in the quantum random-oracle model. In Alexandra Boldyreva and Daniele Micciancio, editors, Advances in Cryptology \u2013 CRYPTO 2019, pages 356\u2013383, Cham, 2019. Springer International Publishing.","DOI":"10.1007\/978-3-030-26951-7_13"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Jelle Don, Serge Fehr, Christian Majenz, and Christian Schaffner. Online-extractability in the quantum random-oracle model. In Orr Dunkelman and Stefan Dziembowski, editors, Advances in Cryptology \u2013 EUROCRYPT 2022, pages 677\u2013706, Cham, 2022. Springer International Publishing.","DOI":"10.1007\/978-3-031-07082-2_24"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Fangqi Dong, Qipeng Liu, and Kewen Wu. Tight characterizations for preprocessing against cryptographic salting. In Annual International Cryptology Conference. Springer, 2024.","DOI":"10.1007\/978-3-031-68385-5_12"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Alex\u00a0B. Grilo, Kathrin H\u00f6velmanns, Andreas H\u00fclsing, and Christian Majenz. Tight adaptive reprogramming in the qrom. In Mehdi Tibouchi and Huaxiong Wang, editors, Advances in Cryptology \u2013 ASIACRYPT 2021, pages 637\u2013667, Cham, 2021. Springer International Publishing.","DOI":"10.1007\/978-3-030-92062-3_22"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Juan\u00a0A Garay, Aggelos Kiayias, and Nikos Leonardos. The bitcoin backbone protocol: Analysis and applications. Journal of the ACM, 2015.","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"6_CR18","unstructured":"Chaya Ganesh, Claudio Orlandi, Mahak Pancholi, Akira Takahashi, and Daniel Tschudi. Fiat-shamir bulletproofs are non-malleable (in the random oracle model). Cryptology ePrint Archive, Paper 2023\/147, 2023. https:\/\/eprint.iacr.org\/2023\/147."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Haodong Jiang, Zhi Ma, and Zhenfeng Zhang. Post-quantum security of key encapsulation mechanism against cca attacks with a single decapsulation query. In Jian Guo and Ron Steinfeld, editors, Advances in Cryptology \u2013 ASIACRYPT 2023, pages 434\u2013468, Singapore, 2023. Springer Nature Singapore.","DOI":"10.1007\/978-981-99-8730-6_14"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Shuichi Katsumata. A new simple technique to bootstrap various lattice zero-knowledge proofs to qrom secure nizks. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology \u2013 CRYPTO 2021, pages 580\u2013610, Cham, 2021. Springer International Publishing.","DOI":"10.1007\/978-3-030-84245-1_20"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Haruhisa Kosuge and Keita Xagawa. Probabilistic hash-and-sign with retry in the quantum random oracle model. In Qiang Tang and Vanessa Teague, editors, Public-Key Cryptography \u2013 PKC 2024, pages 259\u2013288, Cham, 2024. Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-57718-5_9"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Troy Lee and J\u00e9r\u00e9mie Roland. A strong direct product theorem for quantum query complexity. computational complexity, 22:429\u2013462, 2013.","DOI":"10.1007\/s00037-013-0066-8"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Qipeng Liu and Mark Zhandry. Revisiting post-quantum fiat-shamir. In Alexandra Boldyreva and Daniele Micciancio, editors, Advances in Cryptology \u2013 CRYPTO 2019, pages 326\u2013355, Cham, 2019. Springer International Publishing.","DOI":"10.1007\/978-3-030-26951-7_12"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Alexander\u00a0A Sherstov. Strong direct product theorems for quantum communication and query complexity. In Proceedings of the forty-third annual ACM symposium on Theory of computing, pages 41\u201350, 2011.","DOI":"10.1145\/1993636.1993643"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Takashi Yamakawa and Mark Zhandry. Classical vs quantum random oracles. In Anne Canteaut and Fran\u00e7ois-Xavier Standaert, editors, Advances in Cryptology \u2013 EUROCRYPT 2021, pages 568\u2013597, Cham, 2021. Springer International Publishing.","DOI":"10.1007\/978-3-030-77886-6_20"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0947-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T05:02:30Z","timestamp":1733634150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0947-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,9]]},"ISBN":["9789819609468","9789819609475"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0947-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,9]]},"assertion":[{"value":"9 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}