Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework)

  • Authors:
  • Joonsang Baek;David Galindo;Willy Susilo;Jianying Zhou

  • Affiliations:
  • Cryptography and Security Department, Institute for Infocomm Research, Singapore;Computer Science Department, University of Malaga,;Centre for Computer and Information Security Research School of Computer Science and Software Engineering, University of Wollongong, Australia;Cryptography and Security Department, Institute for Infocomm Research, Singapore

  • Venue:
  • SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We propose a generic method that transforms a weakly secure KEM, i.e. a KEM which is secure against constrained chosen ciphertext attack (CCCA), to a strongly secure KEM, i.e. a KEM which is secure against full chosen ciphertext attack (CCA). The proposed method does not depend on the random oracle nor any other non- standard assumptions. Using this method, we obtain new efficient hybrid encryption schemes based on Kurosawa&Desmedt and Hofheinz&Kiltz weakly secure KEMs. These are the first hybrid encryption schemes which are as efficient as Kurosawa&Desmedt and Hofheinz&Kiltz encryption schemes, but whose security can be explained in the original KEM/DEM framework.