Articles with "chosen ciphertext" as a keyword



Photo by hudsoncrafted from unsplash

Efficient Chosen-Ciphertext Secure Encryption from R-LWE

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-3979-8

Abstract: In order to construct efficient public-key encryption scheme that is secure against adaptive chosen-ciphertext attacks (CCA), an efficient signature scheme and an identity-based encryption (IBE) scheme from the learning with errors over rings are presented… read more here.

Keywords: secure; scheme; chosen ciphertext; encryption ... See more keywords
Photo by thinkmagically from unsplash

Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3051047

Abstract: Key Encapsulation Mechanism (KEM) is a foundational cryptography primitive, which can provide secure symmetric cryptographic key material for transmission by using public key algorithms. Until now, many Chosen-Ciphertext (IND-CCA) secure KEM schemes are constructed from… read more here.

Keywords: secure; encapsulation mechanism; standard model; key encapsulation ... See more keywords