441
Views
1
CrossRef citations to date
0
Altmetric
Mathematics of Cryptography and Coding in the Quantum Era

On the applicability of the Fujisaki–Okamoto transformation to the BIKE KEM

, , & ORCID Icon
Pages 364-374 | Received 22 May 2020, Accepted 04 May 2021, Published online: 30 May 2021

References

  • N. Aragon, P.S.L.M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.C. Deneuville, P. Gaborit, S. Gueron, T. Güneysu, C.A. Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.P. Tillich, V. Vasseur, and G. Zémor, BIKE: Bit Flipping key encapsulation (2017). Available at https://bikesuite.org/files/BIKE.2017.11.30.pdf.
  • N. Aragon, P.S.L.M. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.C. Deneuville, P. Gaborit, S. Gueron, T. Güneysu, C.A. Melchor, R. Misoczki, E. Persichetti, N. Sendrier, J.P. Tillich, V. Vasseur, and G. Zémor, BIKE: Bit flipping key encapsulation (2017). Available at https://bikesuite.org/files/round2/spec/BIKE-Spec-2019.06.30.1.pdf.
  • M. Baldi, A. Barenghi, F. Chiaraluce, G. Pelosi, and P. Santini, LEDAcrypt: Low-dEnsity parity-check coDe-bAsed cryptographic systems (2020). Available at https://www.ledacrypt.org/.
  • P.S. Barreto, S. Gueron, T. Gueneysu, R. Misoczki, E. Persichetti, N. Sendrier, and J.P. Tillich, CAKE: Code-based algorithm for key encapsulation, IMA International Conference on Cryptography and Coding, Springer, 2017, pp. 207–226.
  • J.C. Deneuville, P. Gaborit, and G. Zémor, Ouroboros: A simple, secure and efficient key exchange protocol based on coding theory, International Workshop on Post-Quantum Cryptography, Springer, 2017, pp. 18–34.
  • N. Drucker, S. Gueron, and D. Kostic, On constant-time QC-MDPC decoding with negligible failure rate, Cryptology ePrint Archive, Report 2019/1289 (2019), Available at https://eprint.iacr.org/2019/1289.
  • N. Drucker, S. Gueron, and D. Kostic, QC-MDPC decoders with several shades of gray, Cryptology ePrint Archive, Report 2019/1423 (2020). Available at https://eprint.iacr.org/2019/1423.
  • D. Hofheinz, K. Hövelmanns, and E. Kiltz, A modular analysis of the Fujisaki-Okamoto transformation, in Theory of Cryptography, Y. Kalai and L. Reyzin, eds., Springer International Publishing, Cham, 2017, pp. 341–371. doi:https://doi.org/10.1007/978-3-319-70500-2_12.
  • V. Shoup, Using hash functions as a hedge against chosen ciphertext attack, in International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2000, pp. 275–288.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.