File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Lossy key encapsulation mechanism and its applications

TitleLossy key encapsulation mechanism and its applications
Authors
KeywordsDeterministic public key encryption
Lossy encryption
Lossy key encapsulation mechanism
Issue Date2017
Citation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, v. 10157 LNCS, p. 126-144 How to Cite?
AbstractWe introduce a new notion, lossy key encapsulation mechanism (lossy KEM), which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a building block, several previous constructions of lossy encryption and deterministic public key encryption can be generalized and improved in efficiency.
Persistent Identifierhttp://hdl.handle.net/10722/312022
ISSN
2023 SCImago Journal Rankings: 0.606
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLiu, Yamin-
dc.contributor.authorLu, Xianhui-
dc.contributor.authorLi, Bao-
dc.contributor.authorXue, Haiyang-
dc.date.accessioned2022-04-06T04:32:00Z-
dc.date.available2022-04-06T04:32:00Z-
dc.date.issued2017-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, v. 10157 LNCS, p. 126-144-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/312022-
dc.description.abstractWe introduce a new notion, lossy key encapsulation mechanism (lossy KEM), which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a building block, several previous constructions of lossy encryption and deterministic public key encryption can be generalized and improved in efficiency.-
dc.languageeng-
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.subjectDeterministic public key encryption-
dc.subjectLossy encryption-
dc.subjectLossy key encapsulation mechanism-
dc.titleLossy key encapsulation mechanism and its applications-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-319-53177-9_6-
dc.identifier.scopuseid_2-s2.0-85012991982-
dc.identifier.volume10157 LNCS-
dc.identifier.spage126-
dc.identifier.epage144-
dc.identifier.eissn1611-3349-
dc.identifier.isiWOS:000419043200006-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats