2021 IEEE International Symposium on Information Theory (ISIT) 2021
DOI: 10.1109/isit45174.2021.9517958
|View full text |Cite
|
Sign up to set email alerts
|

Information-theoretic Key Encapsulation and its Application to Secure Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 30 publications
0
6
0
Order By: Relevance
“…The OWSKA construction uses two universal hash functions h and h ′ for the two tasks. This construction was first proposed in [32] for an iKEM with IND-CEA security for q e encapsulation queries (and no decapsulation queries), and used two strongly universal hash functions, h and h ′ . Construction 1 has the same security properties but uses universal hash families.…”
Section: A Our Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…The OWSKA construction uses two universal hash functions h and h ′ for the two tasks. This construction was first proposed in [32] for an iKEM with IND-CEA security for q e encapsulation queries (and no decapsulation queries), and used two strongly universal hash functions, h and h ′ . Construction 1 has the same security properties but uses universal hash families.…”
Section: A Our Resultsmentioning
confidence: 99%
“…All above works are in public-key setting. KEM/DEM in correlated randomness setting was introduced in [32] where authors considered passive adversaries with access to encapsulation queries, only. We extend this work in a number of ways.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations