Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework)

9Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose a generic method that transforms a weakly secure KEM, i.e. a KEM which is secure against constrained chosen ciphertext attack (CCCA), to a strongly secure KEM, i.e. a KEM which is secure against full chosen ciphertext attack (CCA). The proposed method does not depend on the random oracle nor any other non- standard assumptions. Using this method, we obtain new efficient hybrid encryption schemes based on Kurosawa&Desmedt and Hofheinz&Kiltz weakly secure KEMs. These are the first hybrid encryption schemes which are as efficient as Kurosawa&Desmedt and Hofheinz&Kiltz encryption schemes, but whose security can be explained in the original KEM/DEM framework. © Springer-Verlag Berlin Heidelberg 2008.

Cite

CITATION STYLE

APA

Baek, J., Galindo, D., Susilo, W., & Zhou, J. (2008). Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5229 LNCS, pp. 358–374). https://doi.org/10.1007/978-3-540-85855-3_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free