## Cryptology ePrint Archive: Report 2019/590

Tighter proofs of CCA security in the quantum random oracle model

Nina Bindel and Mike Hamburg and Kathrin Hövelmanns and Andreas Hülsing and Edoardo Persichetti

Abstract: [Modified slightly because MathJax doesn't render $U^{notbot}$ correctly]

We revisit the construction of IND-CCA secure key encapsulation mechanisms (KEM) from public-key encryption schemes (PKE). We give new, tighter security reductions for several constructions. Our main result is a tight reduction for the security of the $U^{notbot}$-transform of Hofheinz, Hövelmanns, and Kiltz (TCC'17) which turns OW-CPA secure deterministic PKEs into IND-CCA secure KEMs. This result is enabled by a new one-way to hiding (O2H) lemma which gives a tighter bound than previous O2H lemmas in certain settings and might be of independent interest. We extend this result also to the case of PKEs with non-zero decryption failure probability, partially non-injective PKEs, and non-deterministic PKEs. In addition, we analyze the impact of different variations of the $U^{notbot}$-transform discussed in the literature on the security of the final scheme. We consider the difference between explicit and implicit rejection, proving that security of the former implies security of the latter. We show that the opposite direction holds if the scheme with explicit rejection also uses key confirmation. Finally, we prove that (at least from a theoretic point of view) security is independent of whether the session keys are derived from message and ciphertext or just from the message.

Category / Keywords: public-key cryptography / Quantum random oracle model, key encapsulation mechanisms, Fujisaki-Okamoto, one-way to hiding

Original Publication (in the same form): IACR-TCC-2019

Date: received 29 May 2019, last revised 20 Sep 2019

Contact author: nbindel at cdc informatik tu-darmstadt de,mike@shiftleft org,Kathrin Hoevelmanns@ruhr-uni-bochum de,andreas@huelsing net,epersichetti@fau edu

Available format(s): PDF | BibTeX Citation

Note: Revision adds an acknowledgement: Part of this work was done while the authors were participating in the 2019 Oxford Post-Quantum Cryptography Workshop.

Short URL: ia.cr/2019/590

[ Cryptology ePrint archive ]