A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a public-key encryption (PKE) scheme and then apply the Fujisaki–Okamoto (FO) transform that turns any weakly secure PKE scheme into an IND-CCA secure KEM using derandomization and a re-encapsulation check. This talk will discuss three advanced concepts that tackle certain limitations of FO when being used in practice:
By incorporating such functionality into FO directly, KEMs can achieve these extended forms of
security by applying the new FO transforms to existing post-quantum public PKE building blocks.
NIST Workshop on Guidance for KEMs
February 25-26, 2025 (Virtual)
NIST Workshop on Guidance for KEMs
Starts: February 25, 2025Virtual
Security and Privacy: key management, post-quantum cryptography