2015
DOI: 10.1142/s012905411550001x
|View full text |Cite
|
Sign up to set email alerts
|

On the Construction of Public Key Encryption with Sender Recovery

Abstract: This paper investigates public key encryption that has a desirable feature of allowing the sender of a ciphertext to recover the original plaintext from the ciphertext without relying on a recipient's private decryption key (PKE-SR). We propose two efficient methods for converting KEM/DEM (key encapsulation mechanisms/data encapsulation mechanisms) to PKE-SR. The first method, called pre-KEM seeding, can be applied to a large class of KEM/DEM constructions including those based on the discrete logarithm proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…In the past decades, symmetric cryptography was the primary technology to encrypt the data, but it lacks in exchanging the secret private key securely. To overcome the drawbacks of the symmetric cryptography, researchers invented public key cryptography [1].…”
Section: Cryptography Involves Mathematics and Computermentioning
confidence: 99%
“…In the past decades, symmetric cryptography was the primary technology to encrypt the data, but it lacks in exchanging the secret private key securely. To overcome the drawbacks of the symmetric cryptography, researchers invented public key cryptography [1].…”
Section: Cryptography Involves Mathematics and Computermentioning
confidence: 99%