Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting

Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic tran...

全面介紹

Saved in:
書目詳細資料
Main Authors: ZHANG, Zhengyu, WEI, Puwen, XUE, Haiyang
格式: text
語言:English
出版: Institutional Knowledge at Singapore Management University 2019
主題:
KEM
CCA
在線閱讀:https://ink.library.smu.edu.sg/sis_research/9204
https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Singapore Management University
語言: English
id sg-smu-ink.sis_research-10209
record_format dspace
spelling sg-smu-ink.sis_research-102092024-08-13T05:07:55Z Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting ZHANG, Zhengyu WEI, Puwen XUE, Haiyang Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with �-correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo. 2019-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/9204 info:doi/10.1007/978-3-030-31578-8_8 https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University KEM QROM CCA Tight security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic KEM
QROM
CCA
Tight security
Information Security
spellingShingle KEM
QROM
CCA
Tight security
Information Security
ZHANG, Zhengyu
WEI, Puwen
XUE, Haiyang
Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
description Due to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with �-correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo.
format text
author ZHANG, Zhengyu
WEI, Puwen
XUE, Haiyang
author_facet ZHANG, Zhengyu
WEI, Puwen
XUE, Haiyang
author_sort ZHANG, Zhengyu
title Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_short Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_full Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_fullStr Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_full_unstemmed Tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
title_sort tighter security proofs for post-quantum key encapsulation mechanism in the multi-challenge setting
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/9204
https://ink.library.smu.edu.sg/context/sis_research/article/10209/viewcontent/tighter.pdf
_version_ 1814047790423080960