Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic tran...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9204 https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-10209 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-102092024-08-13T05:07:55Z Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting ZHANG, Zhengyu WEI, Puwen XUE, Haiyang Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with �-correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo. 2019-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9204 info:doi/10.1007/978-3-030-31578-8_8 https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University KEM QROM CCA Tight security Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
KEM QROM CCA Tight security Information Security |
spellingShingle |
KEM QROM CCA Tight security Information Security ZHANG, Zhengyu WEI, Puwen XUE, Haiyang Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
description |
Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with �-correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo. |
format |
text |
author |
ZHANG, Zhengyu WEI, Puwen XUE, Haiyang |
author_facet |
ZHANG, Zhengyu WEI, Puwen XUE, Haiyang |
author_sort |
ZHANG, Zhengyu |
title |
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
title_short |
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
title_full |
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
title_fullStr |
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
title_full_unstemmed |
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
title_sort |
tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2019 |
url |
https://ink.library.smu.edu.sg/sis_research/9204 https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf |
_version_ |
1814047790423080960 |