Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms

被引:67
|
作者
Targhi, Ehsan Ebrahimi [1 ]
Unruh, Dominique [1 ]
机构
[1] Univ Tartu, Tartu, Estonia
来源
关键词
Quantum; Random oracle; Indistinguishability against chosen ciphertext attacks;
D O I
10.1007/978-3-662-53644-5_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the quantum random oracle model. Our scheme is a combination of an asymmetric and a symmetric encryption scheme that are secure in a weak sense. It is a slight modification of the Fujisaki-Okamoto transform that is secure against classical adversaries. In addition, we modify the OAEP-cryptosystem and prove its security in the quantum random oracle model based on the existence of a partial-domain one-way injective function secure against quantum adversaries.
引用
收藏
页码:192 / 216
页数:25
相关论文
共 50 条
  • [1] About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call
    Gonzalez de la Torre, Miguel Angel
    Hernandez Encinas, Luis
    [J]. INTERNATIONAL JOINT CONFERENCE 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS (CISIS 2022) 13TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATION (ICEUTE 2022), 2023, 532 : 75 - 85
  • [2] KDM Security for the Fujisaki-Okamoto Transformations in the QROM
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    [J]. PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 286 - 315
  • [3] QCCA Security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model
    Liu, Xu
    Wang, Mingqiang
    [J]. PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 239 - 259
  • [4] On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
    Kitagawa, Fuyuki
    Matsuda, Takahiro
    Hanaoka, Goichiro
    Tanaka, Keisuke
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 2016, 9614 : 99 - 129
  • [5] Fujisaki-Okamoto hybrid encryption revisited
    Galindo D.
    Martín S.
    Morillo P.
    Villar J.L.
    [J]. International Journal of Information Security, 2005, 4 (4) : 228 - 241
  • [6] Post-quantum Security of Plain OAEP Transform
    Ebrahimi, Ehsan
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 34 - 51
  • [7] A Modular Analysis of the Fujisaki-Okamoto Transformation
    Hofheinz, Dennis
    Hoevelmanns, Kathrin
    Kiltz, Eike
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 341 - 371
  • [8] On the applicability of the Fujisaki-Okamoto transformation to the BIKE KEM
    Drucker, Nir
    Gueron, Shay
    Kostic, Dusan
    Persichetti, Edoardo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 364 - 374
  • [9] On the Complete Non-malleability of the Fujisaki-Okamoto Transform
    Friolo, Daniele
    Salvino, Matteo
    Venturi, Daniele
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 307 - 335
  • [10] Applying Fujisaki-Okamoto to identity-based encryption
    Yang, P
    Kitagawa, T
    Hanaoka, G
    Zhang, R
    Matsuura, K
    Imai, H
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2006, 3857 : 183 - 192