March 3, 2023, 4:06 p.m. |

IACR News www.iacr.org

ePrint Report: Memory-Tight Multi-Challenge Security of Public-Key Encryption

Joseph Jaeger, Akshaya Kumar


We give the first examples of public-key encryption schemes which can be proven to achieve multi-challenge, multi-user CCA security via reductions that are tight in time, advantage, and memory. Our constructions are obtained by applying the KEM-DEM paradigm to variants of Hashed ElGamal and the Fujisaki-Okamoto transformation that are augmented by adding uniformly random strings to their ciphertexts and/or keys.


The reductions carefully combine recent proof techniques introduced …

cca challenge encryption eprint report key keys memory paradigm public random report security strings transformation

Security Architect

@ Alter Solutions | Lisboa, Portugal

Information Security Program Manager

@ Fisher Investments | Tampa, FL, United States

Digital Security Infrastructure Manager

@ Wizz Air | Budapest, HU, H-1103

Sr. Solution Consultant

@ Highspot | Sydney

Cyber Security Analyst III

@ Love's Travel Stops | Oklahoma City, OK, US, 73120

Lead Security Engineer

@ JPMorgan Chase & Co. | Tampa, FL, United States