Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
From MaRDI portal
Publication:5385726
DOI10.1007/11426639_8zbMath1137.94336OpenAlexW2122987162MaRDI QIDQ5385726
Victor Shoup, Kaoru Kurosawa, Rosario Gennaro, Masayuki Abe
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_8
Related Items (26)
The ECCA Security of Hybrid Encryptions ⋮ On the Impossibility of Strong Encryption Over $\aleph_0$ ⋮ Authenticated Key Exchange and Key Encapsulation in the Standard Model ⋮ Sender-binding key encapsulation ⋮ Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Offline Assisted Group Key Exchange ⋮ Timed-release computational secret sharing and threshold encryption ⋮ Generic Constructions of Stateful Public Key Encryption and Their Applications ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Signcryption Schemes Based on the Diffie–Hellman Problem ⋮ Hybrid Signcryption ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption ⋮ Some (in)sufficient conditions for secure hybrid encryption ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure ⋮ Efficient KEMs with Partial Message Recovery ⋮ A New Rabin-type Trapdoor Permutation Equivalent to Factoring ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations ⋮ Post-Quantum Constant-Round Group Key Exchange from Static Assumptions ⋮ Security on Hybrid Encryption with the Tag-KEM/DEM Framework ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity ⋮ On the Security of Tag-KEM for Signcryption
Uses Software
This page was built for publication: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM