Composed Fujisaki-Okamoto Transform #
This file exposes the composed two-RO Fujisaki-Okamoto transform together with a single-RO
specialization for the H(m) branch.
The canonical two-RO Fujisaki-Okamoto family is the U-transform instantiated with a variant-specific key-derivation input and rejection policy.
Instances For
The hash-oracle interface for the single-RO FO variant: one public oracle maps (pkh pk, m)
to both encryption coins and the shared key.
Instances For
The full oracle world for the single-RO FO variant, consisting of unrestricted public
randomness plus the combined (pkh pk, m) ↦ (r, k) random oracle.
Instances For
Cache state for the single lazy random oracle used by the single-RO FO variant.
Instances For
Lazy single random oracle returning both coins and the derived key.
Instances For
Single-RO FO hash world: both the encryption coins and the shared key are derived from the
same public random-oracle query on (pkh pk, msg).
Instances For
Single-RO specialization for the H(m) branch. The oracle input is (pkh pk, m) and the
oracle output supplies both the encryption coins and the shared key.
Instances For
Runtime bundle for the canonical two-RO Fujisaki-Okamoto oracle world.
Instances For
Runtime bundle for the single-RO Fujisaki-Okamoto oracle world.
Instances For
Main composed Fujisaki-Okamoto IND-CCA theorem statement.
WARNING: this is a placeholder statement, not the final theorem. The current shape is
unsound as written: correctnessBound and epsMsg are unconstrained ℝ parameters, so
the right-hand side can be made arbitrarily negative while the left-hand side is a
probability and hence nonnegative. In the final composed FO statement these slack terms
must be constrained (correctnessBound is the underlying PKE's δ-correctness error, and
epsMsg is the message-distribution collision/min-entropy term, both provably nonnegative
quantities derived from pke).
The proof is intentionally deferred. The reduction artifacts (cpaAdv₁, cpaAdv₂,
prfAdv) are existentially quantified rather than passed in as unrelated inputs, but the
bound itself still needs to be tightened before this can be a meaningful security claim.