Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM - MaRDI portal

Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM

From MaRDI portal
Publication:5385726

DOI10.1007/11426639_8zbMath1137.94336OpenAlexW2122987162MaRDI QIDQ5385726

Victor Shoup, Kaoru Kurosawa, Rosario Gennaro, Masayuki Abe

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_8




Related Items (26)

The ECCA Security of Hybrid EncryptionsOn the Impossibility of Strong Encryption Over $\aleph_0$Authenticated Key Exchange and Key Encapsulation in the Standard ModelSender-binding key encapsulationConstruction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionOffline Assisted Group Key ExchangeTimed-release computational secret sharing and threshold encryptionGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsEfficient One-Round Key Exchange in the Standard ModelSigncryption Schemes Based on the Diffie–Hellman ProblemHybrid SigncryptionTag-KEM/DEM: A new framework for hybrid encryptionToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionSome (in)sufficient conditions for secure hybrid encryptionEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureEfficient KEMs with Partial Message RecoveryA New Rabin-type Trapdoor Permutation Equivalent to FactoringCCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsPost-Quantum Constant-Round Group Key Exchange from Static AssumptionsSecurity on Hybrid Encryption with the Tag-KEM/DEM FrameworkNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsConstructing Secure Hybrid Encryption from Key Encapsulation Mechanism with AuthenticityOn the Security of Tag-KEM for Signcryption


Uses Software



This page was built for publication: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM