{"created":"2025-01-19T01:23:01.674324+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00223153","sets":["6164:6165:6462:11124"]},"path":["11124"],"owner":"44499","recid":"223153","title":["KyberとSaberの耐量子計算機安全性(概要版)"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-10-17"},"_buckets":{"deposit":"f11aa6bd-5d28-4bd8-872d-38a881f03b80"},"_deposit":{"id":"223153","pid":{"type":"depid","value":"223153","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"KyberとSaberの耐量子計算機安全性(概要版)","author_link":["587299","587297","587298","587296"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"KyberとSaberの耐量子計算機安全性(概要版)"},{"subitem_title":"Post-quantum Security of Kyber and Saber (Extended Abstract) ","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"耐量子計算機暗号, PQC, Kyber, Saber","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2022-10-17","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"ETH Zürich"},{"subitem_text_value":"NTT社会情報研究所"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"ETH Zürich","subitem_text_language":"en"},{"subitem_text_value":"Social Informatics Laboratories, NTT Coporation","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/223153/files/IPSJ-CSS2022098.pdf","label":"IPSJ-CSS2022098.pdf"},"date":[{"dateType":"Available","dateValue":"2024-10-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2022098.pdf","filesize":[{"value":"310.3 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"23329173-1907-4a5d-8496-a86a661cb55d","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Varun, Maram"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"草川, 恵太"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Varun, Maram","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Keita, Xagawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Grubbs, Maram, Paterson (EUROCRYPT 2022) は,Kyber や Saber で採用されている藤崎岡本変換の変種について,量子ランダムオラクルモデルにおける IND-CCA 安全性の証明がなされていないことを指摘した.Bernstein により Zhandry の量子ランダムオラクルの量子識別不可能性を用いると証明が通るだろうと指摘されたが,具体的なバウンドは分かっていない.本稿では, Kyber と Saber の量子ランダムオラクルモデルにおける IND-CCA 安全性(と匿名性)を別の手法を用いて証明し,具体的な不等式を与える. ","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Grubbs, Maram, and Paterson (EUROCRYPT 2022) pointed out that Kyber and Saber gave two tweaks for the implicit-rejection version of the Fujisaki-Okamoto (FO) transform and there is no IND-CCA security proof for the tweaked FO transform in the quantum random oracle model. Bernstein suggested using Zhandry's quantum indifferentiability (CRYPTO 2019) to remedy the IND-CCA security proof but there is no concrete bound for the IND-CCA security. This paper gives explicit security proof for the tweaked FO transform in the quantum random model and applies it to Kyber and Saber. Additionally, we apply the technique to those anonymity. ","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"728","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2022論文集"}],"bibliographicPageStart":"722","bibliographicIssueDates":{"bibliographicIssueDate":"2022-10-17","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":223153,"updated":"2025-01-19T13:29:43.685626+00:00","links":{}}