CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◌ Quantum Computing Mar 24, 2026

Is the Quantum Random Oracle Model (QROM) relevant for proving security of quantum cryptographic protocols?

Quantum Computing SE Archived Mar 24, 2026 ✓ Full text saved

I am familiar with the Quantum Random Oracle Model (QROM), and know that many post-quantum cryptography schemes rely on QROM-based security proofs. My question concerns whether the QROM plays a similar role in quantum cryptography, specifically in protocols like Quantum Key Distribution. Is the QROM used (or useful) in security proofs for quantum cryptographic schemes?

Full text archived locally
✦ AI Summary · Claude Sonnet


    Is the Quantum Random Oracle Model (QROM) relevant for proving security of quantum cryptographic protocols? Ask Question Asked today Modified today Viewed 3 times 1 I am familiar with the Quantum Random Oracle Model (QROM), and know that many post-quantum cryptography schemes rely on QROM-based security proofs. My question concerns whether the QROM plays a similar role in quantum cryptography, specifically in protocols like Quantum Key Distribution. Is the QROM used (or useful) in security proofs for quantum cryptographic schemes? cryptographyqkd Share Improve this question Follow asked 3 hours ago Rui 111 1 bronze badge New contributor Add a comment Know someone who can answer? Share a link to this question via email, Twitter, or Facebook. Your Answer Sign up or log in Sign up using Google Sign up using Email and Password Post as a guest Name Email Required, but never shown Post Your Answer By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy. Start asking to get answers Find the answer to your question by asking. Ask question Explore related questions cryptographyqkd See similar questions with these tags. The Overflow Blog Multi-stage attacks are the Final Fantasy bosses of security After all the hype, was 2025 really the year of AI agents? Related 11 Rigorous security proof for Wiesner's quantum money 9 How to justify post quantum encryption security? 6 Lattice based cryptography vs BB84 12 What authentication protocol to use for BB84 and other QKD protocols? 7 Could quantum computers be useful for sending encrypted information over a classical channel? 1 Must the cryptographic test for quantumness in [BCMVV18] use post-quantum Trapdoor Claw-Free Functions? 0 Is there a notion of “computational security” in quantum cryptography? 5 How can one cheat in Mahadev's classical verification protocol if one can find a "claw''? 3 Why is the combination of NTRU Prime and X25519 ECDH in OpenSSH believed to be secure against quantum attacks? Hot Network Questions Which philosophers argue against treating belief systems as independent entities? Does "marine grade plywood" go by other names? Roper multiattack management clarification What is the meaning behind the story "Vision" by Osama Alomar? Interpretation of certain clauses in The Ones Who Walk Away from Omelas by Ursula K. LeGuin more hot questions Question feed By continuing to use this website, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy. By exiting this window, default cookies will be accepted. To reject cookies, select an option from below. Customize settings Cookie Consent Preference Center When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy Accept all cookies Manage Consent Preferences Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Targeting Cookies Targeting Cookies These cookies are used to make advertising messages more relevant to you and may be set through our site by us or by our advertising partners. They may be used to build a profile of your interests and show you relevant advertising on our site or on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. Performance Cookies Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Functional Cookies Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookie List Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Necessary cookies only Confirm My Choices
    💬 Team Notes
    Article Info
    Source
    Quantum Computing SE
    Category
    ◌ Quantum Computing
    Published
    Mar 24, 2026
    Archived
    Mar 24, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗