Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- 1 January 2005
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 128-146
- https://doi.org/10.1007/11426639_8
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold CryptographyLecture Notes in Computer Science, 2004
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Chosen-Ciphertext Security from Identity-Based EncryptionLecture Notes in Computer Science, 2004
- Concealment and Its Applications to Authenticated EncryptionLecture Notes in Computer Science, 2003
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext AttackSIAM Journal on Computing, 2003
- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key EncryptionLecture Notes in Computer Science, 2002
- Robust Distributed Multiplication without InteractionLecture Notes in Computer Science, 1999
- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)Lecture Notes in Computer Science, 1999
- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attackLecture Notes in Computer Science, 1998
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993