2020
DOI: 10.1007/978-3-030-64837-4_10
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications

Abstract: A multi-recipient key encapsulation mechanism, or mKEM, provides a scalable solution to securely communicating to a large group, and o↵ers savings in both bandwidth and computational cost compared to the trivial solution of communicating with each member individually. All prior works on mKEM are only limited to classical assumptions and, although some generic constructions are known, they all require specific properties that are not shared by most post-quantum schemes. In this work, we first provide a simple a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 45 publications
0
20
0
Order By: Relevance
“…The notion of merged KEMs [32] aims to optimize bandwidth for public ratchets in the Signal protocol; our work and the notion of split KEMs instead is concerned with the initial key agreement with contributions from both parties. In their notion of multi-recipient KEMs, Katsumata et al [45] also decompose the encapsulation process, though without allowing a secret input of the sender to enter encapsulation as in our split KEM notion.…”
Section: Related Workmentioning
confidence: 99%
“…The notion of merged KEMs [32] aims to optimize bandwidth for public ratchets in the Signal protocol; our work and the notion of split KEMs instead is concerned with the initial key agreement with contributions from both parties. In their notion of multi-recipient KEMs, Katsumata et al [45] also decompose the encapsulation process, though without allowing a secret input of the sender to enter encapsulation as in our split KEM notion.…”
Section: Related Workmentioning
confidence: 99%
“…We introduce the notion of a committing mPKE, or CmPKE. First, a (decomposable) multi-recipient PKE (mPKE) [43] takes as input a message M and a list of N encryption keys, and outputs a multi-recipient ciphertext (ct 0 ,…”
Section: 11mentioning
confidence: 99%
“…We show how to build a CmPKE from an mPKE [43] and a key-committing SKE [2,32,33,37], which can itself be built using standard symmetric primitives [2]. Compared to the base mPKE, the overhead is minimal: ct i = ct i , and T is formed of ct 0 and a term of size 2κ bits, which is no larger than a hash digest.…”
Section: 11mentioning
confidence: 99%
See 2 more Smart Citations