Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform

نویسندگان

چکیده

In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving rather unnatural task of finding failing plaintexts given private key, resulting in Grover search bound. Moreover, they require an implicit rejection mechanism invalid ciphertexts to achieve reasonable bound QROM. We present that has neither these deficiencies: introduce two games related failures, one capturing computationally hard using public key find failure, and statistically searching random oracle key-independent like, e.g., large randomness. As result, our bounds QROM tighter than previous ones with respect generic attacks: The attacker can only partially compute predicate, namely said failures. addition, entire works explicit-reject variant transformation improves significantly over all its reductions. Besides being more natural explicit reject is also relevant side channel attack resilience implicit-rejection variant. Along way, we prove several technical results characterizing preimage extraction certain tasks might be independent interest.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum security of the Fujisaki-Okamoto transform

In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the quantum random oracle model. Our scheme is a combination of an asymmetric and a symmetric encryption scheme that are secure in a weak sense. It is a slight modi cation of Fujisaki and Okamoto's transformation that is secure against classical adversaries. keywords: Quantum, Random Oracle, Indistinguishab...

متن کامل

Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms

In this paper, we present a hybrid encryption scheme that is chosen ciphertext secure in the quantum random oracle model. Our scheme is a combination of an asymmetric and a symmetric encryption scheme that are secure in a weak sense. It is a slight modification of the Fujisaki-Okamoto transform that is secure against classical adversaries. In addition, we modify the OAEP-cryptosystem and prove ...

متن کامل

Applying Fujisaki-Okamoto to Identity-Based Encryption

The Fujisaki-Okamoto (FO) conversion is widely known to be able to generically convert a weak public key encryption scheme, say one-way against chosen plaintext attacks (OW-CPA), to a strong one, namely, indistinguishable against adaptive chosen ciphertext attacks (IND-CCA). It is not known that if the same holds for identity-based encryption (IBE) schemes, though many IBE and variant schemes a...

متن کامل

Fujisaki-Okamoto IND-CCA hybrid encryption revisited

At Crypto’99, Fujisaki and Okamoto [10] presented a nice generic transformation from weak asymmetric and symmetric schemes into an IND-CCA hybrid encryption scheme in the Random Oracle Model. From this transformation, two specific candidates to standardization were designed: EPOC-2 [9] and PSEC2 [16], based on Okamoto-Uchiyama and El Gamal primitives, respectively. Since then, several cryptanal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-22972-5_15