Abstract
The QC-MDPC code-based KEM BIKE is one of the Round-3 candidates of the NIST PQC standardization project. Its Round-2 specification document described variants claiming to have IND-CCA security. The security proof used the Fujisaki–Okamoto transformation and a decoder targeting a Decoding Failure Rate (DFR) of (Formula presented.) (for Level-1 security). However, several aspects needed to be amended in order for the IND-CCA proof to hold. The main issue is that using a decoder with DFR of (Formula presented.) does not necessarily imply that the underlying PKE is δ-correct with (Formula presented.), as required. In this paper, we handle the necessary aspects to ensure the security claim is correct. In particular, we close the gap in the proof by defining the notion of message-agnostic PKE. We show that the PKEs underlying the BIKE versions are message-agnostic. This implies that BIKE with a decoder that has a sufficiently low DFR is also an IND-CCA KEM.
Original language | English |
---|---|
Pages (from-to) | 364-374 |
Number of pages | 11 |
Journal | International Journal of Computer Mathematics: Computer Systems Theory |
Volume | 6 |
Issue number | 4 |
DOIs | |
State | Published - 2021 |
Bibliographical note
Funding Information:This research was supported by: NSF-BSF (United States-Israel Binational Science Foundation) [grant number 2018640]; NSF Grant CNS (Division of Computer and Network Systems) [grant number 1906360]; The Israel Science Foundation [grant number 3380/19]. The BIU Center for Research in Applied Cryptography and Cyber Security, and the Center for Cyber Law and Policy at the University of Haifa, both in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office.
Publisher Copyright:
© 2021 Informa UK Limited, trading as Taylor & Francis Group.
Keywords
- BIKE
- Fujisaki–Okamoto
- NIST
- QC-MDPC codes
- post-quantum cryptography
ASJC Scopus subject areas
- Computational Theory and Mathematics
- Computational Mathematics