Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Presentation

Advanced FO Concepts: Verifiable Decapsulation, Multi-user Security, and Rejection Modes

February 26, 2025

Presenters

Lewis Glabush - EPFL

Description

A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a public-key encryption (PKE) scheme and then apply the Fujisaki–Okamoto (FO) transform that turns any weakly secure PKE scheme into an IND-CCA secure KEM using derandomization and a re-encapsulation check. This talk will discuss three advanced concepts that tackle certain limitations of FO when being used in practice:

  1. verifiable decapsulation, to prevent faulty implementations from skipping the FO reencapsulation check;
  2. salting, to reduce the impact of multi-ciphertext attacks on KEMs built from PKEs with small message spaces; and;
  3. security of rejection modes, for simpler designs and to justify usage of FO-based KEMs within bigger protocols even if protocol interactions leak their rejection behavior.

By incorporating such functionality into FO directly, KEMs can achieve these extended forms of
security by applying the new FO transforms to existing post-quantum public PKE building blocks.

Presented at

NIST Workshop on Guidance for KEMs
February 25-26, 2025 (Virtual)

Downloads

Event Details

Location

    Virtual

Related Topics

Security and Privacy: key management, post-quantum cryptography

Created February 26, 2025, Updated April 28, 2025