On the applicability of the Fujisaki–Okamoto transformation to the BIKE KEM

Nir Drucker, Shay Gueron, Dusan Kostic, Edoardo Persichetti

Research output: Contribution to journalArticlepeer-review

Abstract

The QC-MDPC code-based KEM BIKE is one of the Round-3 candidates of the NIST PQC standardization project. Its Round-2 specification document described variants claiming to have IND-CCA security. The security proof used the Fujisaki–Okamoto transformation and a decoder targeting a Decoding Failure Rate (DFR) of (Formula presented.) (for Level-1 security). However, several aspects needed to be amended in order for the IND-CCA proof to hold. The main issue is that using a decoder with DFR of (Formula presented.) does not necessarily imply that the underlying PKE is δ-correct with (Formula presented.), as required. In this paper, we handle the necessary aspects to ensure the security claim is correct. In particular, we close the gap in the proof by defining the notion of message-agnostic PKE. We show that the PKEs underlying the BIKE versions are message-agnostic. This implies that BIKE with a decoder that has a sufficiently low DFR is also an IND-CCA KEM.

Original languageEnglish
Pages (from-to)364-374
Number of pages11
JournalInternational Journal of Computer Mathematics: Computer Systems Theory
Volume6
Issue number4
DOIs
StatePublished - 2021

Bibliographical note

Publisher Copyright:
© 2021 Informa UK Limited, trading as Taylor & Francis Group.

Keywords

  • BIKE
  • Fujisaki–Okamoto
  • NIST
  • QC-MDPC codes
  • post-quantum cryptography

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computational Mathematics

Fingerprint

Dive into the research topics of 'On the applicability of the Fujisaki–Okamoto transformation to the BIKE KEM'. Together they form a unique fingerprint.

Cite this