580 California St., Suite 400
San Francisco, CA, 94104
Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Table 4 2.4.3 Submission proposal: Round2.KEM This section describes Round2.KEM, an IND-CPA-secure key encapsulation method. It builds on CPA-PKE (Section 2.4.2). In addition to the parameters and functions from CPA-PKE, it uses a system parameter \, and an injection bin, : Rilnxm x Zi — {0,1}, and a hash function H : {0,1}* > {0,1}#8. The system parameter A satisfies
Discover breakthrough research and expand your academic network
Join for free