File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting

TitleTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting
Authors
KeywordsCCA
KEM
QROM
Tight security
Issue Date2019
PublisherSpringer
Citation
18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019. In Mu, Y, Deng, R, Huang, X (Eds), Cryptology and Network Security: 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings, p. 141-160. Cham, Switzerland: Springer, 2019 How to Cite?
AbstractDue to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with δ -correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo.
Persistent Identifierhttp://hdl.handle.net/10722/312056
ISBN
ISSN
2023 SCImago Journal Rankings: 0.606
ISI Accession Number ID
Series/Report no.Lecture Notes in Computer Science ; 11829
LNCS sublibrary. SL 4, Security and Cryptology

 

DC FieldValueLanguage
dc.contributor.authorZhang, Zhengyu-
dc.contributor.authorWei, Puwen-
dc.contributor.authorXue, Haiyang-
dc.date.accessioned2022-04-06T04:32:05Z-
dc.date.available2022-04-06T04:32:05Z-
dc.date.issued2019-
dc.identifier.citation18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019. In Mu, Y, Deng, R, Huang, X (Eds), Cryptology and Network Security: 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings, p. 141-160. Cham, Switzerland: Springer, 2019-
dc.identifier.isbn9783030315771-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/312056-
dc.description.abstractDue to the threat posed by quantum computers, a series of works investigate the security of cryptographic schemes in the quantum-accessible random oracle model (QROM) where the adversary can query the random oracle in superposition. In this paper, we present tighter security proofs of a generic transformations for key encapsulation mechanism (KEM) in the QROM in the multi-challenge setting, where the reduction loss is independent of the number of challenge ciphertexts. In particular, we introduce the notion of multi-challenge OW-CPA (mOW-CPA) security, which captures the one-wayness of the underlying public key encryption (PKE) under chosen plaintext attack in the multi-challenge setting. We show that the multi-challenge IND-CCA (mIND-CCA) security of KEM can be reduced to the mOW-CPA security of the underlying PKE scheme (with δ -correctness) using transformation. Then we prove that the mOW-CPA security can be tightly reduced to the underlying post-quantum assumptions by showing the tight mOW-CPA security of two concrete PKE schemes based on LWE, where one is the Regev’s PKE scheme and the other is a variant of Frodo.-
dc.languageeng-
dc.publisherSpringer-
dc.relation.ispartofCryptology and Network Security: 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings-
dc.relation.ispartofseriesLecture Notes in Computer Science ; 11829-
dc.relation.ispartofseriesLNCS sublibrary. SL 4, Security and Cryptology-
dc.subjectCCA-
dc.subjectKEM-
dc.subjectQROM-
dc.subjectTight security-
dc.titleTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-030-31578-8_8-
dc.identifier.scopuseid_2-s2.0-85075695086-
dc.identifier.spage141-
dc.identifier.epage160-
dc.identifier.eissn1611-3349-
dc.identifier.isiWOS:000547783200008-
dc.publisher.placeCham, Switzerland-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats