Academia.eduAcademia.edu

2.4.3 Submission proposal: Round2.KEM  This section describes Round2.KEM, an IND-CPA-secure key encapsulation method. It builds on CPA-PKE (Section 2.4.2). In addition to the parameters and functions from CPA-PKE, it uses a system parameter \, and an injection bin, : Rilnxm x Zi — {0,1}, and a hash function H : {0,1}* > {0,1}#8. The system parameter A satisfies

Table 4 2.4.3 Submission proposal: Round2.KEM This section describes Round2.KEM, an IND-CPA-secure key encapsulation method. It builds on CPA-PKE (Section 2.4.2). In addition to the parameters and functions from CPA-PKE, it uses a system parameter \, and an injection bin, : Rilnxm x Zi — {0,1}, and a hash function H : {0,1}* > {0,1}#8. The system parameter A satisfies