搜索结果: 1-11 共查到“军事学 key encapsulation mechanism”相关记录11条 . 查询时间(0.125 秒)
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model
non-tightness quantum random oracle model Fujisaki-Okamoto
2019/5/21
Key encapsulation mechanism (KEM) variants of the Fujisaki-Okamoto (FO) transformation (CRYPTO 1999 and Journal of Cryptology 2013) that turn a weakly-secure public-key encryption (PKE) into an IND-CC...
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model
quantum random oracle model key encapsulation mechanism generic construction
2019/2/27
In (TCC 2017), Hofheinz, Hoevelmanns and Kiltz provided a fine-grained and modular toolkit of generic key encapsulation mechanism (KEM) constructions, which were widely used among KEM submissions to N...
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model
quantum random oracle model key encapsulation mechanism explicit rejection
2019/1/26
The recent post-quantum cryptography standardization project launched by NIST increased the interest in generic key encapsulation mechanism (KEM) constructions in the quantum random oracle (QROM). Bas...
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism
Authenticated Key Exchange CK Model Key Encapsulation Mechanism
2018/11/19
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM)....
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tight security quantum chosen-ciphertext security post-quantum cryptography
2018/11/16
This paper shows the security against quantum chosen-ciphertext attacks (QCCA security) of the KEM in Saito, Yamakawa, and Xagawa (EUROCRYPT 2018) in the QROM. The proof is very similar to that for th...
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
Tight security chosen-ciphertext security post-quantum cryptography
2017/10/16
We give a first tight security reduction for a conversion from a weakly secure public-key encryption scheme to an IND-CCA-secure key-encapsulation mechanism scheme in the quantum random oracle model. ...
Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism
implementation Leakage-resilient cryptography
2016/1/6
Leakage-resilient cryptography aims to extend the rigorous
guarantees achieved through the provable security paradigm to physical
implementations. The constructions and mechanisms designed on basis
...
While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mech...
Identity-Based Key-Encapsulation Mechanism from Multilinear Maps
Key-Encapsulation Multilinear Maps
2014/3/5
We construct an Identity-Based Key Encapsulation Mechanism (IB-KEM) in a generic "leveled" multilinear map setting and prove its security under multilinear decisional Diffie-Hellmanin assumption in th...
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism
Equivalence Security Notions Key Encapsulation Mechanism
2008/12/10
KEM (Key Encapsulation Mechanism) was introduced by Shoup to formalize the asymmetric
encryption specified for key distribution in ISO standards on public-key encryption. Shoup defined the “semantic ...