On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions

被引:8
|
作者
Kitagawa, Fuyuki [1 ,2 ]
Matsuda, Takahiro [2 ]
Hanaoka, Goichiro [2 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
来源
关键词
Public key encryption; Key dependent message security; Chosen ciphertext security; ENCRYPTION; CRYPTOSYSTEM;
D O I
10.1007/978-3-662-49384-7_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In PKC 1999, Fujisaki and Okamoto showed how to convert any public key encryption (PKE) scheme secure against chosen plaintext attacks (CPA) to a PKE scheme which is secure against chosen ciphertext attacks (CCA) in the random oracle model. Surprisingly, the resulting CCA secure scheme has almost the same efficiency as the underlying CPA secure scheme. Moreover, in J. Cryptology 2013, they proposed more efficient conversion by using the hybrid encryption framework. In this work, we clarify whether these two constructions are also secure in the sense of key dependent message security against chosen ciphertext attacks (KDM-CCA security), under exactly the same assumptions on the building blocks as those used by Fujisaki and Okamoto. Specifically, we show two results: Firstly, we show that the construction proposed in PKC 1999 does not satisfy KDM-CCA security generally. Secondly, on the other hand, we show that the construction proposed in J. Cryptology 2013 satisfies KDM-CCA security.
引用
收藏
页码:99 / 129
页数:31
相关论文
共 50 条
  • [1] KDM Security for the Fujisaki-Okamoto Transformations in the QROM
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    PUBLIC-KEY CRYPTOGRAPHY, PKC 2022, PT II, 2022, 13178 : 286 - 315
  • [2] Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
    Targhi, Ehsan Ebrahimi
    Unruh, Dominique
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT II, 2016, 9986 : 192 - 216
  • [3] Fujisaki-Okamoto hybrid encryption revisited
    Galindo D.
    Martín S.
    Morillo P.
    Villar J.L.
    International Journal of Information Security, 2005, 4 (4) : 228 - 241
  • [4] A Modular Analysis of the Fujisaki-Okamoto Transformation
    Hofheinz, Dennis
    Hoevelmanns, Kathrin
    Kiltz, Eike
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 341 - 371
  • [5] QCCA Security of Fujisaki-Okamoto Transformation in the Quantum Random Oracle Model
    Liu, Xu
    Wang, Mingqiang
    PROGRESS IN CRYPTOLOGY, AFRICACRYPT 2024, 2024, 14861 : 239 - 259
  • [6] On the applicability of the Fujisaki-Okamoto transformation to the BIKE KEM
    Drucker, Nir
    Gueron, Shay
    Kostic, Dusan
    Persichetti, Edoardo
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (04) : 364 - 374
  • [7] Applying Fujisaki-Okamoto to identity-based encryption
    Yang, P
    Kitagawa, T
    Hanaoka, G
    Zhang, R
    Matsuura, K
    Imai, H
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2006, 3857 : 183 - 192
  • [8] On the Complete Non-malleability of the Fujisaki-Okamoto Transform
    Friolo, Daniele
    Salvino, Matteo
    Venturi, Daniele
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 307 - 335
  • [9] Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization
    Chen, Zhao
    Lu, Xianhui
    Jia, Dingding
    Li, Bao
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 110 - 130
  • [10] Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform
    Hovelmanns, Kathrin
    Hulsing, Andreas
    Majenz, Christian
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT IV, 2022, 13794 : 414 - 443