cronokirby

(2026-03) Tighter Proofs for PKE-to-KEM Transformations under Average-Case Decryption Error and without -gamma-Spread

2026-03-06

Abstract

In the NIST post-quantum standardization process, Fujisaki-Okamoto-like (FO-like) transformation has become the de facto paradigm for constructing IND-CCA secure key encapsulation mechanisms (KEMs) from public-key encryption (PKE). However, most post-quantum PKE schemes exhibit decryption error, which poses significant challenges for the security proofs of FO-like PKE-to-KEM transformations, particularly in the quantum-accessible random oracle model (QROM). Hofheinz, Hövelmanns, and Kiltz (TCC 2017) gave the first QROM security proofs for PKE-to-KEM transformations under \textit{worst-case} decryption error. To relax this to the more designer-friendly one of \textit{average-case} decryption error, Duman et al. (PKC 2023) presented two transformations, FOAC0\mathsf{FOAC}_0 and FOAC\mathsf{FOAC}, which are under average-case decryption error but introduce substantial loss in QROM reduction tightness (O(q8)\mathcal{O}(q^8) for FOAC0\mathsf{FOAC}_0 and O(q6)\mathcal{O}(q^6) for FOAC\mathsf{FOAC}) and the need for the γ\gamma-spread assumption on the underlying PKEs. Very recently, Ge et al. (ePrint 2025) removed the γ\gamma-spread assumption for FOAC0\mathsf{FOAC}_0 and improved the QROM reduction tightness to O(q4)\mathcal{O}(q^4) for both FOAC0\mathsf{FOAC}_0 and FOAC\mathsf{FOAC}.

In this work, we make further advances by introducing two refined variants: FOAC0\mathsf{FOAC}'_0 and FOAC\mathsf{FOAC'}. We provide new security analyses in both the ROM and the QROM, and present the following key contributions: (1) Compared with previous transformations under average-case decryption error, FOAC0\mathsf{FOAC}'_0 and FOAC\mathsf{FOAC'} exhibit tighter security proofs with QROM reduction loss of only O(q2)\mathcal{O}(q^2) for FOAC0\mathsf{FOAC}'_0 and O(q3)\mathcal{O}(q^3) for FOAC\mathsf{FOAC'} when the underlying PKE is OW‑CPA secure, and just O(q)\mathcal{O}(q) when it is deterministic or IND‑CPA security; (2) Both FOAC0\mathsf{FOAC}'_0 and FOAC\mathsf{FOAC'} eliminate the γ\gamma-spread assumption entirely, further relaxing the requirements on the underlying PKE.

To support our QROM proofs, we provide three new QROM proof techniques that build on Zhandry's compressed oracle technique (CRYPTO 2019). These techniques may be of independent interest and could have broader applicability in post-quantum cryptography.