Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

4
  • $\begingroup$ If I understand correctly, you're saying that KEMs using Fujisaki-Okamoto construction should be immune from the attack? $\endgroup$ Commented 17 hours ago
  • $\begingroup$ @twisteroidambassador Assuming they're built sans mathematical loopholes like that subgroup thing. $\endgroup$ Commented 16 hours ago
  • 2
    $\begingroup$ I do not believe that Fujisaki-Okamoto protects against malicious public keys. What it protects against are malicious ciphertexts. The FO transform is run by the decapsulator (Bob in your example); this attack is against Alice, who does not perform it. $\endgroup$ Commented 15 hours ago
  • $\begingroup$ @poncho Clarified my intent. $\endgroup$ Commented 1 hour ago