About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call
International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022)(2022)
摘要
Post-quantum encryption schemes use variants of the Fujisaki-Okamoto transformation in order to construct a highly secure key encapsulation mechanism from a weakly secure public key encryption scheme. In the third round of the NIST post-quantum cryptography standardization call, all the candidates for the key encapsulation mechanism category use some of these transformations. This work studies how the mentioned transformations are applied in the code-based candidates of the NIST third round. These are Classic McEliece (finalist), BIKE (alternative) and HQC (alternative). Studying the differences between the transformations gives a better understanding of these candidates.
更多查看译文
关键词
Post-quantum cryptography, Fujisaki-Okamoto transformation, Public key encryption, Key encapsulation mechanism, Code-based cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要