QROM proof for the second construction

Do you think that the second construction can be proved secure in the \mathsf{QROM} using compressed oracle techniques?

Thanks in advance.

Thanks for the question.

Actually it can be done even without the compressed oracle technique.

1 Like