Publikation: Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC
Dateien
Datum
Autor:innen
Herausgeber:innen
ISSN der Zeitschrift
Electronic ISSN
ISBN
Bibliografische Daten
Verlag
Schriftenreihe
Auflagebezeichnung
URI (zitierfähiger Link)
DOI (zitierfähiger Link)
Internationale Patentnummer
Link zur Lizenz
Angaben zur Forschungsförderung
Institutionen der Bundesrepublik Deutschland: Quant-ID (16KISQ111)
Institutionen der Bundesrepublik Deutschland: QUDIS (16KIS2091)
Projekt
Open Access-Veröffentlichung
Core Facility der Universität Konstanz
Titel in einer weiteren Sprache
Publikationstyp
Publikationsstatus
Erschienen in
Zusammenfassung
In this work, we continue the analysis of the binding properties of implicitly-rejecting key-encapsulation mechanisms (KEMs) obtained via the Fujisaki-Okamoto (FO) transform. These binding properties, in earlier literature known under the term robustness, thwart attacks that can arise when using KEMs in complex protocols. Recently, Cremers et al. (CCS'24) introduced a framework for binding notions, encompassing previously existing but also new ones. While implicitly-rejecting FO-KEMs have been analyzed with respect to multiple of these notions, there are still several gaps. We complete the picture by providing positive and negative results for the remaining notions. Further, we show how to apply our results to the code-based KEMs BIKE and HQC, which were round-4 candidates in NIST's PQC standardization process. Through this, we close a second gap as our results complete the analysis of the binding notions for the NIST round-4 KEMs. Finally, we give a modified version of the FO transform that achieves all binding notions.
Zusammenfassung in einer weiteren Sprache
Fachgebiet (DDC)
Schlagwörter
Konferenz
Rezension
Zitieren
ISO 690
KRÄMER, Juliane, Patrick STRUCK, Maximiliane WEISHÄUPL, 2025. Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC. In: IACR Communications in Cryptology. International Association for Cryptologic Research. 2025, 2(2). eISSN 3006-5496. Verfügbar unter: doi: 10.62056/ak2i893y6BibTex
@article{Kramer2025-07-07Bindi-74000,
title={Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC},
year={2025},
doi={10.62056/ak2i893y6},
number={2},
volume={2},
journal={IACR Communications in Cryptology},
author={Krämer, Juliane and Struck, Patrick and Weishäupl, Maximiliane}
}RDF
<rdf:RDF
xmlns:dcterms="http://purl.org/dc/terms/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:bibo="http://purl.org/ontology/bibo/"
xmlns:dspace="http://digital-repositories.org/ontologies/dspace/0.1.0#"
xmlns:foaf="http://xmlns.com/foaf/0.1/"
xmlns:void="http://rdfs.org/ns/void#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#" >
<rdf:Description rdf:about="https://kops.uni-konstanz.de/server/rdf/resource/123456789/74000">
<dc:creator>Weishäupl, Maximiliane</dc:creator>
<bibo:uri rdf:resource="https://kops.uni-konstanz.de/handle/123456789/74000"/>
<dc:creator>Krämer, Juliane</dc:creator>
<dc:language>eng</dc:language>
<dc:rights>Attribution 4.0 International</dc:rights>
<dc:contributor>Weishäupl, Maximiliane</dc:contributor>
<dcterms:abstract>In this work, we continue the analysis of the binding properties of implicitly-rejecting key-encapsulation mechanisms (KEMs) obtained via the Fujisaki-Okamoto (FO) transform. These binding properties, in earlier literature known under the term robustness, thwart attacks that can arise when using KEMs in complex protocols. Recently, Cremers et al. (CCS'24) introduced a framework for binding notions, encompassing previously existing but also new ones. While implicitly-rejecting FO-KEMs have been analyzed with respect to multiple of these notions, there are still several gaps. We complete the picture by providing positive and negative results for the remaining notions. Further, we show how to apply our results to the code-based KEMs BIKE and HQC, which were round-4 candidates in NIST's PQC standardization process. Through this, we close a second gap as our results complete the analysis of the binding notions for the NIST round-4 KEMs. Finally, we give a modified version of the FO transform that achieves all binding notions.</dcterms:abstract>
<dspace:hasBitstream rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/74000/1/Kraemer_2-10h859idcydv88.PDF"/>
<dspace:isPartOfCollection rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dcterms:title>Binding Security of Implicitly-Rejecting KEMs and Application to BIKE and HQC</dcterms:title>
<dcterms:available rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-07-17T08:16:44Z</dcterms:available>
<void:sparqlEndpoint rdf:resource="http://localhost/fuseki/dspace/sparql"/>
<foaf:homepage rdf:resource="http://localhost:8080/"/>
<dc:creator>Struck, Patrick</dc:creator>
<dcterms:hasPart rdf:resource="https://kops.uni-konstanz.de/bitstream/123456789/74000/1/Kraemer_2-10h859idcydv88.PDF"/>
<dc:date rdf:datatype="http://www.w3.org/2001/XMLSchema#dateTime">2025-07-17T08:16:44Z</dc:date>
<dcterms:rights rdf:resource="http://creativecommons.org/licenses/by/4.0/"/>
<dcterms:isPartOf rdf:resource="https://kops.uni-konstanz.de/server/rdf/resource/123456789/36"/>
<dc:contributor>Struck, Patrick</dc:contributor>
<dc:contributor>Krämer, Juliane</dc:contributor>
<dcterms:issued>2025-07-07</dcterms:issued>
</rdf:Description>
</rdf:RDF>