Skip to main content

Showing 1–3 of 3 results for author: Hövelmanns, K

.
  1. A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography

    Authors: Nick Aquina, Bruno Cimoli, Soumya Das, Kathrin Hövelmanns, Fiona Johanna Weber, Chigo Okonkwo, Simon Rommel, Boris Škorić, Idelfonso Tafur Monroy, Sebastian Verschoor

    Abstract: Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems. In this paper, we conduct a comprehensive security evaluation of QKD-based solutions, focusing on real-world use cases sourced from academic literature and industry reports. We analyze these use cases, assess the… ▽ More

    Submitted 15 April, 2025; v1 submitted 6 February, 2025; originally announced February 2025.

    Comments: Accepted for publication in EPJ Quantum Technology

  2. arXiv:2203.10182  [pdf, ps, other

    cs.CR quant-ph

    Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform

    Authors: Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz

    Abstract: In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound. Moreover, they require an implicit rejection mechanism for invalid ciphertexts to achieve a reasonable security bound in the QROM. We present a reduction that… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: 52 pages, 17 figures

  3. Tight adaptive reprogramming in the QROM

    Authors: Alex B. Grilo, Kathrin Hövelmanns, Andreas Hülsing, Christian Majenz

    Abstract: The random oracle model (ROM) enjoys widespread popularity, mostly because it tends to allow for tight and conceptually simple proofs where provable security in the standard model is elusive or costly. While being the adequate replacement of the ROM in the post-quantum security setting, the quantum-accessible random oracle model (QROM) has thus far failed to provide these advantages in many settin… ▽ More

    Submitted 30 October, 2020; v1 submitted 28 October, 2020; originally announced October 2020.

    Journal ref: Tibouchi M., Wang H. (eds) Advances in Cryptology -- ASIACRYPT 2021. ASIACRYPT 2021. Lecture Notes in Computer Science, vol 13090. Springer, Cham