Fujisaki-Okamoto Shared Definitions #
This file defines the shared objects used by the Fujisaki-Okamoto transform:
- explicit-coins PKEs as a specialization of
AsymmEncAlg - the induced randomized
AsymmEncAlg - spread notions and OW-CPA games for the
ProbCompspecialization - OW-PCVA games for the general monadic interface
delta-correctness: failure in the canonical AsymmEncAlg.CorrectExp experiment occurs with
probability at most delta.
Instances For
gamma-spread: no ciphertext occurs with probability more than gamma for any fixed public
key and plaintext.
Instances For
Oracle interface for the one-way under chosen-plaintext attack (OW-CPA) game.
The sum unifSpec + (M →ₒ C) gives the adversary two capabilities:
- unrestricted uniform sampling from any sampleable type
- an encryption oracle on chosen plaintexts
M → C
Instances For
An OW-CPA adversary gets pk, a challenge ciphertext, and oracle access to chosen-plaintext
encryptions.
Instances For
Implementation of the OW-CPA encryption oracle.
Instances For
Main one-way under chosen-plaintext attack (OW-CPA) experiment.
The game samples a fresh keypair and a uniform challenge message, forms the honest challenge
ciphertext via the induced randomized AsymmEncAlg, runs the adversary with oracle access
described by OW_CPA_oracleSpec, and returns true exactly when the adversary recovers the
challenge message.
Instances For
OW-CPA advantage is the probability of recovering the sampled challenge plaintext.
Instances For
Oracle interface for the one-way under plaintext-checking and validity attacks (OW-PCVA) game.
The sum spec + (((C × M) →ₒ Bool) + (C →ₒ Bool)) has three components:
- the ambient oracle interface
spec - a plaintext-checking oracle sending
(c, msg)to whethercdecrypts tomsg - a validity oracle sending
cto whethercdecrypts to some plaintext at all
Instances For
An OW-PCVA adversary gets the public key and challenge ciphertext, and outputs a plaintext guess after querying the plaintext-checking and validity oracles.
Instances For
Oracle implementation for OW-PCVA.
Instances For
Main one-way under plaintext-checking and validity attacks (OW-PCVA) experiment.
The game generates a keypair, samples a uniform challenge message, encrypts it honestly, and
then runs the adversary on the public key and challenge ciphertext. The adversary may query the
ambient oracle interface spec, the plaintext-checking oracle, and the validity oracle, and the
game returns true exactly when the final guess equals the hidden challenge message.
Instances For
OW-PCVA advantage is the message-recovery probability in the above game.