{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:56:40Z","timestamp":1764997000410,"version":"3.40.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_4","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T04:22:02Z","timestamp":1400646122000},"page":"51-68","source":"Crossref","is-referenced-by-count":7,"title":["Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]},{"given":"Le","family":"Trieu Phong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"International Organization for Standardization, Gen\u00e8ve, Switzerland. ISO\/IEC 18033-2:2006, Information technology \u2014 Security techniques \u2014 Encryption Algorithms \u2014 Part 2: Asymmetric Ciphers, Final Committee Draft (2006), http:\/\/shoup.net\/iso\/"},{"key":"4_CR2","unstructured":"Cryptography Research and Evaluation Committees (CRYPTREC). Specifications of ciphers in the Candidate Recommended Ciphers List (March, 2013), http:\/\/www.cryptrec.go.jp\/english\/method.html"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s00145-007-9010-x","volume":"21","author":"M. Abe","year":"2008","unstructured":"Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM\/DEM: A new framework for hybrid encryption. J. Cryptology\u00a021(1), 97\u2013130 (2008)","journal-title":"J. Cryptology"},{"key":"4_CR4","unstructured":"American National Standards Institute. ANSI X9.44-2007: Key Establishment Using Integer Factorization Cryptography (2007)"},{"issue":"7","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1587\/transfun.E95.A.1136","volume":"95-A","author":"H. Anada","year":"2012","unstructured":"Anada, H., Arita, S.: Identification schemes from key encapsulation mechanisms. IEICE Transactions\u00a095-A(7), 1136\u20131155 (2012)","journal-title":"IEICE Transactions"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-540-85855-3_24","volume-title":"Security and Cryptography for Networks","author":"J. Baek","year":"2008","unstructured":"Baek, J., Galindo, D., Susilo, W., Zhou, J.: Constructing strong KEM from weak KEM (or how to revive the KEM\/DEM framework). In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol.\u00a05229, pp. 358\u2013374. Springer, Heidelberg (2008)"},{"key":"4_CR7","unstructured":"Bernstein, D.J.: Pippenger\u2019s exponentiation algorithm (2002), http:\/\/cr.yp.to\/papers\/pippenger.pdf"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1504\/IJACT.2009.023466","volume":"1","author":"C. Boyd","year":"2009","unstructured":"Boyd, C., Cliff, Y., Nieto, J.M.G., Paterson, K.G.: One-round key exchange in the standard model. IJACT\u00a01(3), 181\u2013199 (2009)","journal-title":"IJACT"},{"issue":"16","key":"4_CR9","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1016\/j.ipl.2009.04.007","volume":"109","author":"S.G. Choi","year":"2009","unstructured":"Choi, S.G., Herranz, J., Hofheinz, D., Hwang, J.Y., Kiltz, E., Lee, D.H., Yung, M.: The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Inf. Process. Lett.\u00a0109(16), 897\u2013901 (2009)","journal-title":"Inf. Process. Lett."},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R. Cramer","year":"2001","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing\u00a033, 167\u2013226 (2001)","journal-title":"SIAM Journal on Computing"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/3-540-46035-7_4","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Cramer","year":"2002","unstructured":"Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 45\u201364. Springer, Heidelberg (2002)"},{"issue":"1","key":"4_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00145-009-9051-4","volume":"23","author":"Y. Desmedt","year":"2010","unstructured":"Desmedt, Y., Gennaro, R., Kurosawa, K., Shoup, V.: A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack. J. Cryptology\u00a023(1), 91\u2013120 (2010)","journal-title":"J. Cryptology"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-642-30057-8_28","volume-title":"Public Key Cryptography \u2013 PKC 2012","author":"A. Fujioka","year":"2012","unstructured":"Fujioka, A., Suzuki, K., Xagawa, K., Yoneyama, K.: Strongly secure authenticated key exchange from factoring, codes, and lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol.\u00a07293, pp. 467\u2013484. Springer, Heidelberg (2012)"},{"key":"4_CR15","first-page":"207","volume":"2006","author":"J. Herranz","year":"2006","unstructured":"Herranz, J., Hofheinz, D., Kiltz, E.: The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. IACR Cryptology ePrint Archive\u00a02006, 207 (2006)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"4_CR16","unstructured":"Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. Cryptology ePrint Archive, Report 2007\/288 (2007), http:\/\/eprint.iacr.org\/ . Full version of a paper at Menezes, A. (ed.): CRYPTO 2007. LNCS, vol.\u00a04622. Springer, Heidelberg (2007)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-540-71677-8_19","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"E. Kiltz","year":"2007","unstructured":"Kiltz, E.: Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 282\u2013297. Springer, Heidelberg (2007)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-642-40041-4_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"H. Krawczyk","year":"2013","unstructured":"Krawczyk, H., Paterson, K.G., Wee, H.: On the security of the TLS protocol: A systematic analysis. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol.\u00a08042, pp. 429\u2013448. Springer, Heidelberg (2013)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-540-28628-8_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"K. Kurosawa","year":"2004","unstructured":"Kurosawa, K., Desmedt, Y.G.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 426\u2013442. Springer, Heidelberg (2004)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Kurosawa, K., Phong, L.T.: Kurosawa-Desmedt key encapsulation mechanism, revisited. Cryptology ePrint Archive, Report 2013\/765 (2013), http:\/\/eprint.iacr.org\/ ; Full version of this manuscript","DOI":"10.1007\/978-3-319-06734-6_4"},{"key":"4_CR21","unstructured":"National Institute of Standards and Technology. Recommended elliptic curves for federal government use (1999), http:\/\/csrc.nist.gov\/groups\/ST\/toolkit\/documents\/dss\/NISTReCur.pdf"},{"key":"4_CR22","unstructured":"Okamoto, T.: Authenticated key exchange and key encapsulation in the standard model. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 474\u2013484. Springer, Heidelberg (2007) Revised version available at http:\/\/eprint.iacr.org\/2007\/473"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-03515-4_11","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2013","author":"K. Yoneyama","year":"2013","unstructured":"Yoneyama, K.: Compact authenticated key exchange from bounded CCA-secure KEM. In: Paul, G., Vaudenay, S. (eds.) INDOCRYPT 2013. LNCS, vol.\u00a08250, pp. 161\u2013178. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T00:09:32Z","timestamp":1746230972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}