Paper 2025/343

Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms

Lewis Glabush, École Polytechnique Fédérale de Lausanne
Kathrin Hövelmanns, Eindhoven University of Technology
Douglas Stebila, University of Waterloo
Abstract

A key encapsulation mechanism (KEM) allows two parties to establish a shared secret key using only public communication. For post-quantum KEMs, the most widespread approach is to design a passively secure public-key encryption (PKE) scheme and then apply the Fujisaki–Okamoto (FO) transform that turns any such PKE scheme into an IND-CCA secure KEM. While the base security requirement for KEMs is typically IND-CCA security, adversaries in practice can sometimes observe and attack many public keys and/or ciphertexts, which is referred to as multi-challenge security. FO does not necessarily guarantee multi-challenge security: for example, FrodoKEM, a Round 3 alternate in NIST’s post-quantum project, used FO to achieve IND-CCA security, but was subsequently shown to be vulnerable to attackers that can target multiple ciphertexts. To avert this multi-ciphertext attack, the FrodoKEM team added a salt to the encapsulation procedure and proved that this does not degrade (single-ciphertext) IND-CCA security. The formal analysis of whether this indeed averts multi-ciphertext attacks, however, was left open, which we address in this work. Firstly, we formalize FrodoKEM's approach as a new variant of the FO transform, called the salted FO transform. Secondly, we give tight reductions from multi-challenge security of the resulting KEM to multi-challenge security of the underlying public key encryption scheme, in both the random oracle model (ROM) and the quantum-accessible ROM (QROM). Together these results justify the multi-ciphertext security of the salted FrodoKEM scheme, and can also be used generically by other schemes requiring multi-ciphertext security.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Fujisaki–Okamoto transformkey exchangequantum random oracle modelpost-quantummulti-challenge securityFrodoKEM
Contact author(s)
lewis glabush @ epfl ch
kathrin @ hoevelmanns net
dstebila @ uwaterloo ca
History
2025-02-25: approved
2025-02-24: received
See all versions
Short URL
https://ia.cr/2025/343
License
Creative Commons Attribution-NonCommercial-ShareAlike
CC BY-NC-SA

BibTeX

@misc{cryptoeprint:2025/343,
      author = {Lewis Glabush and Kathrin Hövelmanns and Douglas Stebila},
      title = {Tight Multi-challenge Security Reductions for Key Encapsulation Mechanisms},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/343},
      year = {2025},
      url = {https://eprint.iacr.org/2025/343}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.