CCA encryption in the QROM II

APA

(2020). CCA encryption in the QROM II. The Simons Institute for the Theory of Computing. https://simons.berkeley.edu/talks/cca-encryption-qrom-ii

MLA

CCA encryption in the QROM II. The Simons Institute for the Theory of Computing, Apr. 28, 2020, https://simons.berkeley.edu/talks/cca-encryption-qrom-ii

BibTex

          @misc{ scivideos_15649,
            doi = {},
            url = {https://simons.berkeley.edu/talks/cca-encryption-qrom-ii},
            author = {},
            keywords = {},
            language = {en},
            title = {CCA encryption in the QROM II},
            publisher = {The Simons Institute for the Theory of Computing},
            year = {2020},
            month = {apr},
            note = {15649 see, \url{https://scivideos.org/Simons-Institute/15649}}
          }
          
Ron Steinfeld, Monash University
Source Repository Simons Institute

Abstract

We introduce a new technique called ‘Measure-Rewind- Measure’ (MRM) to achieve tighter security proofs in the quantum random oracle model (QROM). We first apply our MRM technique to derive a new security proof for a variant of the ‘double-sided’ quantum One- Way to Hiding Lemma (O2H) of Bindel et al. [TCC 2019] which, for the first time, avoids the square-root advantage loss in the security proof. In particular, it bypasses a previous ‘impossibility result’ of Jiang, Zhang and Ma [IACR eprint 2019]. We then apply our new O2H Lemma to give a new tighter security proof for the Fujisaki-Okamoto (FO) transform for constructing a strong (IND-CCA) Key Encapsulation Mechanism (KEM) from a weak (IND-CPA) public-key encryption scheme satisfying a mild injectivity assumption.