About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call

González de la Torre Miguel Ángel,Hernández Encinas Luis

International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022)(2022)

引用 0|浏览2
暂无评分
摘要
Post-quantum encryption schemes use variants of the Fujisaki-Okamoto transformation in order to construct a highly secure key encapsulation mechanism from a weakly secure public key encryption scheme. In the third round of the NIST post-quantum cryptography standardization call, all the candidates for the key encapsulation mechanism category use some of these transformations. This work studies how the mentioned transformations are applied in the code-based candidates of the NIST third round. These are Classic McEliece (finalist), BIKE (alternative) and HQC (alternative). Studying the differences between the transformations gives a better understanding of these candidates.
更多
查看译文
关键词
Post-quantum cryptography, Fujisaki-Okamoto transformation, Public key encryption, Key encapsulation mechanism, Code-based cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要