Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework)

RIS ID

26102

Publication Details

Baek, J., Galindo, D., Susilo, W. & Zhou, J. (2008). Constructing strong KEM from weak KEM (or how to revive the KEM/DEM framework). In R. Ostrovsky, R. De Prisco & I. Visconti (Eds.), Security and Cryptography for Networks. Sixth International Conference, SCN 2008 (pp. 358-374). Germany: Springer-verlag.

Abstract

We propose a generic method that transforms a weakly secure KEM, i.e. a KEM which is secure against constrained chosen ciphertext attack (CCCA), to a strongly secure KEM, i.e. a KEM which is secure against full chosen ciphertext attack (CCA). The proposed method does not depend on the random oracle nor any other non- standard assumptions. Using this method, we obtain new efficient hybrid encryption schemes based on Kurosawa&Desmedt and Hofheinz&Kiltz weakly secure KEMs. These are the first hybrid encryption schemes which are as efficient as Kurosawa&Desmedt and Hofheinz&Kiltz encryption schemes, but whose security can be explained in the original KEM/DEM framework.

Please refer to publisher version or contact your library.

Share

COinS
 

Link to publisher version (DOI)

http://dx.doi.org/10.1007/978-3-540-85855-3_24