Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting

Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic tran...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG, Zhengyu, WEI, Puwen, XUE, Haiyang
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
KEM
CCA
Online Access:https://ink.library.smu.edu.sg/sis_research/9204
https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10209
record_format dspace
spelling sg-smu-ink.sis_research-102092024-08-13T05:07:55Z Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting ZHANG, Zhengyu WEI, Puwen XUE, Haiyang Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with �-correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo. 2019-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9204 info:doi/10.1007/978-3-030-31578-8_8 https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University KEM QROM CCA Tight security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic KEM
QROM
CCA
Tight security
Information Security
spellingShingle KEM
QROM
CCA
Tight security
Information Security
ZHANG, Zhengyu
WEI, Puwen
XUE, Haiyang
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
description Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with �-correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo.
format text
author ZHANG, Zhengyu
WEI, Puwen
XUE, Haiyang
author_facet ZHANG, Zhengyu
WEI, Puwen
XUE, Haiyang
author_sort ZHANG, Zhengyu
title Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_short Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_full Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_fullStr Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_full_unstemmed Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_sort tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/9204
https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf
_version_ 1814047790423080960