Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework)
RIS ID
26102
Abstract
We propose a generic method that transforms a weakly secure KEM, i.e. a KEM which is secure against constrained chosen ciphertext attack (CCCA), to a strongly secure KEM, i.e. a KEM which is secure against full chosen ciphertext attack (CCA). The proposed method does not depend on the random oracle nor any other non- standard assumptions. Using this method, we obtain new efficient hybrid encryption schemes based on Kurosawa&Desmedt and Hofheinz&Kiltz weakly secure KEMs. These are the first hybrid encryption schemes which are as efficient as Kurosawa&Desmedt and Hofheinz&Kiltz encryption schemes, but whose security can be explained in the original KEM/DEM framework.
Publication Details
Baek, J., Galindo, D., Susilo, W. & Zhou, J. (2008). Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). In R. Ostrovsky, R. De Prisco & I. Visconti (Eds.), Security and Cryptography for Networks. Sixth International Conference, SCN 2008 (pp. 358-374). Germany: Springer-verlag.