Results 271 to 280 of about 131,074 (313)
Some of the next articles are maybe not open access.

Comparative Analysis of Key Encapsulation Mechanisms

2019 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2019
The paper deals with the possible comparative analysis methods of the cryptographic primitives' properties. Methods of comparative analysis – analytic hierarchy process and variations of weight indices methods are investigated and analyzed. Conclusions are made and recommendations on the use of the cryptographic primitives' estimation methods are ...
Maryna Yesina   +5 more
openaire   +1 more source

Identification Schemes from Key Encapsulation Mechanisms

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011
We propose a generic way for deriving an identification (ID) scheme secure against concurrent man-in-the-middle attacks from a key encapsulation mechanism (KEM) secure against chosen ciphertext attacks on one-wayness (oneway-CCA). Then we give a concrete one-way-CCA secure KEM based on the Computational Diffie-Hellman (CDH) assumption.
Hiroaki Anada, Seiko Arita
openaire   +1 more source

Generic Certificateless Key Encapsulation Mechanism

2007
We propose the first generic construction of certificateless key encapsulation mechanism (CL-KEM) in the standard model, which is also secure against malicious-but-passive KGC attacks. It is based on an ID-based KEM, a public key encryption and a message authentication code.
Qiong Huang, Duncan S. Wong
openaire   +1 more source

Public Verifiable Key Encapsulation Mechanism under Factoring

2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
The cipher text consistency check that can be implemented publicly has practical significance, and it is always an interested studying aspect to construct cryptographic algorithm without pairings in the field of cryptographic. On the other hand, it is one of the most important research topics to design CCA-secure PKE schemes with weaker assumptions ...
Zhen Liu, Xiao Yuan Yang
openaire   +1 more source

Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange

2019
Concerns about the impact of quantum computers on currently deployed public key cryptography have instigated research into not only quantum-resistant cryptographic primitives but also how to transition applications from classical to quantum-resistant solutions.
Nina Bindel   +4 more
openaire   +1 more source

Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited

2014
While the hybrid public key encryption scheme of Kurosawa and Desmedt (CRYPTO 2004) is provably secure against chosen ciphertext attacks (namely, IND-CCA-secure), its associated key encapsulation mechanism (KEM) is not IND-CCA-secure (Herranz et al. 2006, Choi et al. 2009).
Kaoru Kurosawa, Le Trieu Phong
openaire   +1 more source

Key Encapsulation Mechanism from Multilinear Maps

2017
The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system.
Liqun Lv   +3 more
openaire   +1 more source

Efficient constructions of certificate-based key encapsulation mechanism

International Journal of Internet Protocol Technology, 2014
Certificate-based encryption is a useful primitive that combines identity-based encryption and traditional public key encryption while preserving some of their most attractive features. It not only simplifies the cumbersome certificate management in traditional public key encryption, but also overcomes the key escrow and distribution problems inherent ...
Yang Lu, Jiguo Li
openaire   +1 more source

Code-based key encapsulation mechanisms for post-quantum standardization

2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018
The code-based key encapsulation mechanisms for post-quantum standardization, which were presented on the NIST PQC competition, are investigated. The results of the primary comparative analysis of the cryptographic properties and the performance of the key encapsulation schemes are presented.
Alexandr Kuznetsov   +4 more
openaire   +1 more source

A Key Encapsulation Mechanism for NTRU

2005
In this article we present a key encapsulation mechanism (KEM) for NTRU. The KEM is more efficient than a naive approach based on NAEP and resistant against the decryption failures that may occur when using NTRU. We also introduce plaintext awareness for KEMs and use it to tighten a security result by Dent.
openaire   +1 more source

Home - About - Disclaimer - Privacy