Results 271 to 280 of about 131,074 (313)
Some of the next articles are maybe not open access.
Comparative Analysis of Key Encapsulation Mechanisms
2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2019The paper deals with the possible comparative analysis methods of the cryptographic primitives' properties. Methods of comparative analysis – analytic hierarchy process and variations of weight indices methods are investigated and analyzed. Conclusions are made and recommendations on the use of the cryptographic primitives' estimation methods are ...
Maryna Yesina +5 more
openaire +1 more source
Identification Schemes from Key Encapsulation Mechanisms
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011We propose a generic way for deriving an identification (ID) scheme secure against concurrent man-in-the-middle attacks from a key encapsulation mechanism (KEM) secure against chosen ciphertext attacks on one-wayness (oneway-CCA). Then we give a concrete one-way-CCA secure KEM based on the Computational Diffie-Hellman (CDH) assumption.
Hiroaki Anada, Seiko Arita
openaire +1 more source
Generic Certificateless Key Encapsulation Mechanism
2007We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code.
Qiong Huang, Duncan S. Wong
openaire +1 more source
Public Verifiable Key Encapsulation Mechanism under Factoring
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013The cipher text consistency check that can be implemented publicly has practical significance, and it is always an interested studying aspect to construct cryptographic algorithm without pairings in the field of cryptographic. On the other hand, it is one of the most important research topics to design CCA-secure PKE schemes with weaker assumptions ...
Zhen Liu, Xiao Yuan Yang
openaire +1 more source
Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange
2019Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transition applications from classical to quantum-resistant solutions.
Nina Bindel +4 more
openaire +1 more source
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited
2014While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KEM) is not IND-CCA-secure (Herranz et al. 2006, Choi et al. 2009).
Kaoru Kurosawa, Le Trieu Phong
openaire +1 more source
Key Encapsulation Mechanism from Multilinear Maps
2017The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system.
Liqun Lv +3 more
openaire +1 more source
Efficient constructions of certificate-based key encapsulation mechanism
International Journal of Internet Protocol Technology, 2014Certificate-based encryption is a useful primitive that combines identity-based encryption and traditional public key encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional public key encryption, but also overcomes the key escrow and distribution problems inherent ...
Yang Lu, Jiguo Li
openaire +1 more source
Code-based key encapsulation mechanisms for post-quantum standardization
2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018The code-based key encapsulation mechanisms for post-quantum standardization, which were presented on the NIST PQC competition, are investigated. The results of the primary comparative analysis of the cryptographic properties and the performance of the key encapsulation schemes are presented.
Alexandr Kuznetsov +4 more
openaire +1 more source
A Key Encapsulation Mechanism for NTRU
2005In this article we present a key encapsulation mechanism (KEM) for NTRU. The KEM is more efficient than a naive approach based on NAEP and resistant against the decryption failures that may occur when using NTRU. We also introduce plaintext awareness for KEMs and use it to tighten a security result by Dent.
openaire +1 more source

