File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-53177-9_6
- Scopus: eid_2-s2.0-85012991982
- WOS: WOS:000419043200006
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Lossy key encapsulation mechanism and its applications
Title | Lossy key encapsulation mechanism and its applications |
---|---|
Authors | |
Keywords | Deterministic public key encryption Lossy encryption Lossy key encapsulation mechanism |
Issue Date | 2017 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, v. 10157 LNCS, p. 126-144 How to Cite? |
Abstract | We introduce a new notion, lossy key encapsulation mechanism (lossy KEM), which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a building block, several previous constructions of lossy encryption and deterministic public key encryption can be generalized and improved in efficiency. |
Persistent Identifier | http://hdl.handle.net/10722/312022 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Yamin | - |
dc.contributor.author | Lu, Xianhui | - |
dc.contributor.author | Li, Bao | - |
dc.contributor.author | Xue, Haiyang | - |
dc.date.accessioned | 2022-04-06T04:32:00Z | - |
dc.date.available | 2022-04-06T04:32:00Z | - |
dc.date.issued | 2017 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2017, v. 10157 LNCS, p. 126-144 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/312022 | - |
dc.description.abstract | We introduce a new notion, lossy key encapsulation mechanism (lossy KEM), which enhances the notion of key encapsulation mechanism with lossiness, and can be more efficient than lossy trapdoor functions. We show that lossy KEM can be constructed from lossy trapdoor functions, lossy trapdoor relations, and entropic projective hashing. Using lossy KEM as a building block, several previous constructions of lossy encryption and deterministic public key encryption can be generalized and improved in efficiency. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject | Deterministic public key encryption | - |
dc.subject | Lossy encryption | - |
dc.subject | Lossy key encapsulation mechanism | - |
dc.title | Lossy key encapsulation mechanism and its applications | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-53177-9_6 | - |
dc.identifier.scopus | eid_2-s2.0-85012991982 | - |
dc.identifier.volume | 10157 LNCS | - |
dc.identifier.spage | 126 | - |
dc.identifier.epage | 144 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000419043200006 | - |