International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited

Authors:
Haodong Jiang
Zhenfeng Zhang
Long Chen
Hong Wang
Zhi Ma
Download:
DOI: 10.1007/978-3-319-96878-0_4 (login may be required)
Search ePrint
Search Google
Presentation: Slides
Conference: CRYPTO 2018
Abstract: With the gradual progress of NIST’s post-quantum cryptography standardization, the Round-1 KEM proposals have been posted for public to discuss and evaluate. Among the IND-CCA-secure KEM constructions, mostly, an IND-CPA-secure (or OW-CPA-secure) public-key encryption (PKE) scheme is first introduced, then some generic transformations are applied to it. All these generic transformations are constructed in the random oracle model (ROM). To fully assess the post-quantum security, security analysis in the quantum random oracle model (QROM) is preferred. However, current works either lacked a QROM security proof or just followed Targhi and Unruh’s proof technique (TCC-B 2016) and modified the original transformations by adding an additional hash to the ciphertext to achieve the QROM security.In this paper, by using a novel proof technique, we present QROM security reductions for two widely used generic transformations without suffering any ciphertext overhead. Meanwhile, the security bounds are much tighter than the ones derived by utilizing Targhi and Unruh’s proof technique. Thus, our QROM security proofs not only provide a solid post-quantum security guarantee for NIST Round-1 KEM schemes, but also simplify the constructions and reduce the ciphertext sizes. We also provide QROM security reductions for Hofheinz-Hövelmanns-Kiltz modular transformations (TCC 2017), which can help to obtain a variety of combined transformations with different requirements and properties.
Video from CRYPTO 2018
BibTeX
@inproceedings{crypto-2018-28808,
  title={IND-CCA-Secure Key Encapsulation Mechanism in the Quantum Random Oracle Model, Revisited},
  booktitle={Advances in Cryptology – CRYPTO 2018},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={10993},
  pages={96-125},
  doi={10.1007/978-3-319-96878-0_4},
  author={Haodong Jiang and Zhenfeng Zhang and Long Chen and Hong Wang and Zhi Ma},
  year=2018
}