A modular analysis of the Fujisaki-Okamoto transformation

From MaRDI portal
Publication:1690199

DOI10.1007/978-3-319-70500-2_12zbMath1410.94082OpenAlexW2740966734WikidataQ60220891 ScholiaQ60220891MaRDI QIDQ1690199

Eike Kiltz, Kathrin Hövelmanns, Dennis Hofheinz

Publication date: 19 January 2018

Full work available at URL: https://doi.org/10.1007/978-3-319-70500-2_12




Related Items (95)

SoK: how (not) to design and implement post-quantum cryptographyMemory-Tight Reductions for Practical Key Encapsulation MechanismsDecryption Failure Is More Likely After SuccessGeneralization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key EncryptionA Note on the Instantiability of the Quantum Random OracleEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityTowards post-quantum security for signal's X3DH handshakeOn Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based ProtocolQuantum lattice enumeration and tweaking discrete pruningOn the hardness of the computational ring-LWR problem and its applicationsKHAPE: Asymmetric PAKE from key-hiding key exchangeResistance of isogeny-based cryptographic implementations to a fault attackTightness subtleties for multi-user PKE notionsFO-like combiners and hybrid post-quantum cryptographyA new adaptive attack on SIDHAn efficient post-quantum KEM from CSIDHA practicable timing attack against HQC and its countermeasureThe rank-based cryptography libraryPerformance bounds for QC-MDPC codes decodersTightly secure ring-LWE based key encapsulation with short ciphertextsAnonymous, robust post-quantum public key encryptionPost-quantum security of the Even-Mansour cipherAnonymity of NIST PQC round 3 KEMsOn IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3Online-extractability in the quantum random-oracle modelECC\(^2\): error correcting code and elliptic curve based cryptosystemMultitarget Decryption Failure Attacks and Their Application to Saber and KyberTighter proofs of CCA security in the quantum random oracle modelGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionSHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHOn optimizing electricity markets performanceUnique-path identity based encryption with applications to strongly secure messagingLet attackers program ideal models: modularity and composability for adaptive compromiseSystematic study of decryption and re-encryption leakage: the case of KyberMulti-instance secure public-key encryptionDesigning efficient dyadic operations for cryptographic applicationsPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelA thorough treatment of highly-efficient NTRU instantiations\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMGroup action key encapsulation and non-interactive key exchange in the QROMSIDH proof of knowledgeTowards automating cryptographic hardware implementations: a case study of HQCIND-CCA security of Kyber in the quantum random oracle model, revisitedHigher-order masked SaberCompact and tightly selective-opening secure public-key encryption schemesMemory-tight multi-challenge security of public-key encryptionRoadmap of post-quantum cryptography standardization: side-channel attacks and countermeasuresExploring decryption failures of BIKE: new class of weak keys and key recovery attacksFormal verification of Saber's public-key encryption scheme in easycryptOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelTight adaptive reprogramming in the QROMFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesFault-enabled chosen-ciphertext attacks on KyberA new key recovery side-channel attack on HQC with chosen ciphertextPost-quantum signal key agreement from SIDHOn security notions for encryption in a quantum worldA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackEnhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchainInstantiability of classical random-oracle-model encryption transformsFailing gracefully: decryption failures and the Fujisaki-Okamoto transformConcrete security from worst-case to average-case lattice reductionsTighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle modelError correction and ciphertext quantization in lattice cryptographyCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsScalable ciphertext compression techniques for post-quantum KEMs and their applicationsPost-quantum verification of Fujisaki-OkamotoA new decryption failure attack against HQCTightly CCA-secure encryption scheme in a multi-user setting with corruptionsTowards practical key exchange from ordinary isogeny graphsCSIDH: an efficient post-quantum commutative group actionBI-NTRU Encryption Schemes: Two New Secure Variants of NTRUTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingClassical misuse attacks on NIST round 2 PQC. The power of rank-based schemesSaber on ESP32On the supersingular GPST attackReproducible families of codes and cryptographic applicationsSupersingular Isogeny-based Cryptography: A SurveyDAGS: key encapsulation using dyadic GS codesBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeLIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesMeasure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA securityTweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizesGeneric authenticated key exchange in the quantum random oracle modelOne-way functions and malleability oracles: hidden shift attacks on isogeny-based protocolsQCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle modelOn the integer polynomial learning with errors problemPractical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiencyA key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEMA gapless code-based hash proof system based on RQC and its applicationsSecure hybrid encryption in the standard model from hard learning problemsSeparate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability




This page was built for publication: A modular analysis of the Fujisaki-Okamoto transformation