Keyword : key encapsulation mechanism


Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 132-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
authenticated key exchangekey encapsulation mechanismbounded CCA
 Summary | Full Text:PDF(254.4KB)

Identification Schemes from Key Encapsulation Mechanisms
Hiroaki ANADA Seiko ARITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/07/01
Vol. E95-A  No. 7 ; pp. 1136-1155
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
identification schemekey encapsulation mechanismone-way-CCA2 securityconcurrent man-in-the-middle attackthe computational Diffie-Hellman assumption
 Summary | Full Text:PDF(410.8KB)

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA Kaoru KUROSAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1293-1305
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionchosen-ciphertext securitykey encapsulation mechanism
 Summary | Full Text:PDF(435.6KB)