Paper 2025/343
Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms
Abstract
A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a passively secure public-key encryption (PKE) scheme and then apply the Fujisaki–Okamoto (FO) transform that turns any such PKE scheme into an IND-CCA secure KEM. While the base security requirement for KEMs is typically IND-CCA security, adversaries in practice can sometimes observe and attack many public keys and/or ciphertexts, which is referred to as multi-challenge security. FO does not necessarily guarantee multi-challenge security: for example, FrodoKEM, a Round 3 alternate in NIST’s post-quantum project, used FO to achieve IND-CCA security, but was subsequently shown to be vulnerable to attackers that can target multiple ciphertexts. To avert this multi-ciphertext attack, the FrodoKEM team added a salt to the encapsulation procedure and proved that this does not degrade (single-ciphertext) IND-CCA security. The formal analysis of whether this indeed averts multi-ciphertext attacks, however, was left open, which we address in this work. Firstly, we formalize FrodoKEM's approach as a new variant of the FO transform, called the salted FO transform. Secondly, we give tight reductions from multi-challenge security of the resulting KEM to multi-challenge security of the underlying public key encryption scheme, in both the random oracle model (ROM) and the quantum-accessible ROM (QROM). Together these results justify the multi-ciphertext security of the salted FrodoKEM scheme, and can also be used generically by other schemes requiring multi-ciphertext security.
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Fujisaki–Okamoto transformkey exchangequantum random oracle modelpost-quantummulti-challenge securityFrodoKEM
- Contact author(s)
-
lewis glabush @ epfl ch
kathrin @ hoevelmanns net
dstebila @ uwaterloo ca - History
- 2025-02-25: approved
- 2025-02-24: received
- See all versions
- Short URL
- https://ia.cr/2025/343
- License
-
CC BY-NC-SA
BibTeX
@misc{cryptoeprint:2025/343, author = {Lewis Glabush and Kathrin Hövelmanns and Douglas Stebila}, title = {Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/343}, year = {2025}, url = {https://eprint.iacr.org/2025/343} }