We propose a generic method that transforms a weakly secure KEM, i.e. a KEM which is secure against constrained chosen ciphertext attack (CCCA), to a strongly secure KEM, i.e. a KEM which is secure against full chosen ciphertext attack (CCA). The proposed method does not depend on the random oracle nor any other non- standard assumptions. Using this method, we obtain new efficient hybrid encryption schemes based on Kurosawa&Desmedt and Hofheinz&Kiltz weakly secure KEMs. These are the first hybrid encryption schemes which are as efficient as Kurosawa&Desmedt and Hofheinz&Kiltz encryption schemes, but whose security can be explained in the original KEM/DEM framework. © Springer-Verlag Berlin Heidelberg 2008.
CITATION STYLE
Baek, J., Galindo, D., Susilo, W., & Zhou, J. (2008). Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5229 LNCS, pp. 358–374). https://doi.org/10.1007/978-3-540-85855-3_24
Mendeley helps you to discover research relevant for your work.