{"title":"标签- kem /DEM框架,用于非交互式开放的公钥加密","authors":"Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka","doi":"10.1587/TRANSINF.2017ICP0003","DOIUrl":null,"url":null,"abstract":"We present a Tag-KEM/DEM framework for public-key encryption with non-interactive opening. Using this framework we explain the idea behind an existing scheme, that is, we obtain some of such schemes as an instantiation of our framework. In addition, using our framework, we can obtain a scheme which can encrypt arbitrary-length plaintexts.","PeriodicalId":278189,"journal":{"name":"2016 International Symposium on Information Theory and Its Applications (ISITA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Tag-KEM/DEM framework for public-key encryption with non-interactive opening\",\"authors\":\"Yusuke Sakai, Takahiro Matsuda, Goichiro Hanaoka\",\"doi\":\"10.1587/TRANSINF.2017ICP0003\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a Tag-KEM/DEM framework for public-key encryption with non-interactive opening. Using this framework we explain the idea behind an existing scheme, that is, we obtain some of such schemes as an instantiation of our framework. In addition, using our framework, we can obtain a scheme which can encrypt arbitrary-length plaintexts.\",\"PeriodicalId\":278189,\"journal\":{\"name\":\"2016 International Symposium on Information Theory and Its Applications (ISITA)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Symposium on Information Theory and Its Applications (ISITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1587/TRANSINF.2017ICP0003\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Symposium on Information Theory and Its Applications (ISITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1587/TRANSINF.2017ICP0003","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tag-KEM/DEM framework for public-key encryption with non-interactive opening
We present a Tag-KEM/DEM framework for public-key encryption with non-interactive opening. Using this framework we explain the idea behind an existing scheme, that is, we obtain some of such schemes as an instantiation of our framework. In addition, using our framework, we can obtain a scheme which can encrypt arbitrary-length plaintexts.