Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogeny

被引:9
|
作者
Yoneyama, Kazuki [1 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki, Japan
关键词
Post-quantum cryptosystems; Isogeny-based cryptosystems; CSIDH;
D O I
10.1145/3338500.3360336
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introduce new isogeny-based KEM schemes (i.e., CSIDH-ECIES-KEM and CSIDH-PSEC-KEM) by modifying Diffie-Hellman-based KEM schemes in ISO/IEC standards. The main advantage of our schemes are compactness. The key size and the ciphertext overhead of our schemes are about five times smaller than these of SIKE-KEM which is submitted to NIST's post-quantum cryptosystems standardization.
引用
收藏
页码:13 / 21
页数:9
相关论文
共 21 条
  • [1] Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 69 - 78
  • [2] Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model
    Xu, Shengfeng
    Li, Xiangxue
    IEEE ACCESS, 2021, 9 : 13683 - 13690
  • [3] Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
    Long, Yu
    Chen, Kefei
    INFORMATION SCIENCES, 2010, 180 (07) : 1167 - 1181
  • [4] Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code
    Dey, Jayashree
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 175 - 193
  • [5] Post-quantum secure compact deterministic wallets from isogeny-based signatures with rerandomized keys
    Shaw, Surbhi
    Dutta, Ratna
    THEORETICAL COMPUTER SCIENCE, 2025, 1035
  • [6] Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices
    Yang, Xiaopeng
    Ma, Wenping
    Zhang, Chengli
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (05) : 866 - 883
  • [7] RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices
    Lee, Joohee
    Kim, Duhyeong
    Lee, Hyungkyu
    Lee, Younho
    Cheon, Jung Hee
    IEEE ACCESS, 2019, 7 : 2080 - 2091
  • [8] Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism
    Nosouhi, Mohammad Reza
    Shah, Syed W.
    Pan, Lei
    Zolotavkin, Yevhen
    Nanda, Ashish
    Gauravaram, Praveen
    Doss, Robin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2160 - 2174
  • [9] Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
    Benz, Laurin
    Beskorovajnov, Wasilij
    Eilebrecht, Sarai
    Groell, Roland
    Mueller, Maximilian
    Mueller-Quade, Jorn
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 257 - 288
  • [10] Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
    Seyhan, Kuebra
    Akleylek, Sedat
    PEERJ COMPUTER SCIENCE, 2023, 9