2018
DOI: 10.1007/978-3-030-01950-1_30
|View full text |Cite
|
Sign up to set email alerts
|

CCA Secure Multi-recipient KEM from LPN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Yu et al [18] constructed an IND-CCA secure key encapsulation mechanism by using FO transformation [19]- [21] to the IND-CPA secure key encapsulation mechanism. In [22], Cheng et al constructed a multiple-recipient Key-Encapsulation Mechanism (mKEM) scheme in the Random Oracle Model (ROM) from low-noise LPN.…”
Section: Introductionmentioning
confidence: 99%
“…Yu et al [18] constructed an IND-CCA secure key encapsulation mechanism by using FO transformation [19]- [21] to the IND-CPA secure key encapsulation mechanism. In [22], Cheng et al constructed a multiple-recipient Key-Encapsulation Mechanism (mKEM) scheme in the Random Oracle Model (ROM) from low-noise LPN.…”
Section: Introductionmentioning
confidence: 99%
“…First, to the best of our knowledge, all the literature on mKEMs is based on classical assumptions (e.g., Di e-Hellman type assumptions) which are believed to not endure quantum adversaries. We are aware of one recent work [17] that claims the construction of an IND-CCA secure mKEM from the learning parity with noise (LPN) assumption, which is believed to be quantumly secure. However, while going over their results, we noticed that their scheme is insecure since there is a trivial break in their claimed IND-CCA security.…”
Section: Introductionmentioning
confidence: 99%