Is the Quantum Random Oracle Model (QROM) relevant for proving security of quantum cryptographic protocols?
Quantum Computing SEArchived Mar 24, 2026✓ Full text saved
I am familiar with the Quantum Random Oracle Model (QROM), and know that many post-quantum cryptography schemes rely on QROM-based security proofs. My question concerns whether the QROM plays a similar role in quantum cryptography, specifically in protocols like Quantum Key Distribution. Is the QROM used (or useful) in security proofs for quantum cryptographic schemes?
Full text archived locally
✦ AI Summary· Claude Sonnet
Is the Quantum Random Oracle Model (QROM) relevant for proving security of quantum cryptographic protocols?
Ask Question
Asked today
Modified today
Viewed 3 times
1
I am familiar with the Quantum Random Oracle Model (QROM), and know that many post-quantum cryptography schemes rely on QROM-based security proofs.
My question concerns whether the QROM plays a similar role in quantum cryptography, specifically in protocols like Quantum Key Distribution. Is the QROM used (or useful) in security proofs for quantum cryptographic schemes?
cryptographyqkd
Share
Improve this question
Follow
asked 3 hours ago
Rui
111
1 bronze badge
New contributor
Add a comment
Know someone who can answer? Share a link to this question via email, Twitter, or Facebook.
Your Answer
Sign up or log in
Sign up using Google
Sign up using Email and Password
Post as a guest
Name
Email
Required, but never shown
Post Your Answer
By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy.
Start asking to get answers
Find the answer to your question by asking.
Ask question
Explore related questions
cryptographyqkd
See similar questions with these tags.
The Overflow Blog
Multi-stage attacks are the Final Fantasy bosses of security
After all the hype, was 2025 really the year of AI agents?
Related
11
Rigorous security proof for Wiesner's quantum money
9
How to justify post quantum encryption security?
6
Lattice based cryptography vs BB84
12
What authentication protocol to use for BB84 and other QKD protocols?
7
Could quantum computers be useful for sending encrypted information over a classical channel?
1
Must the cryptographic test for quantumness in [BCMVV18] use post-quantum Trapdoor Claw-Free Functions?
0
Is there a notion of “computational security” in quantum cryptography?
5
How can one cheat in Mahadev's classical verification protocol if one can find a "claw''?
3
Why is the combination of NTRU Prime and X25519 ECDH in OpenSSH believed to be secure against quantum attacks?
Hot Network Questions
Which philosophers argue against treating belief systems as independent entities?
Does "marine grade plywood" go by other names?
Roper multiattack management clarification
What is the meaning behind the story "Vision" by Osama Alomar?
Interpretation of certain clauses in The Ones Who Walk Away from Omelas by Ursula K. LeGuin
more hot questions
Question feed
By continuing to use this website, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. By exiting this window, default cookies will be accepted. To reject cookies, select an option from below.
Customize settings
Cookie Consent Preference Center
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer.
Cookie Policy
Accept all cookies
Manage Consent Preferences
Strictly Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information.
Targeting Cookies
Targeting Cookies
These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device.
Performance Cookies
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
Functional Cookies
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.
Cookie List
Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label
Necessary cookies only Confirm My Choices