Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-3979-8
Abstract: In order to construct efficient public-key encryption scheme that is secure against adaptive chosen-ciphertext attacks (CCA), an efficient signature scheme and an identity-based encryption (IBE) scheme from the learning with errors over rings are presented…
read more here.
Keywords:
secure;
scheme;
chosen ciphertext;
encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3051047
Abstract: Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms. Until now, many Chosen-Ciphertext (IND-CCA) secure KEM schemes are constructed from…
read more here.
Keywords:
secure;
encapsulation mechanism;
standard model;
key encapsulation ... See more keywords