Notes on KEMs and digital signature schemes

This is what I would have covered today in class: KEMs-and-DS

To go with it, here is a video that proves the result claimed in the KEM notes, i.e. that the composition of a secure KEM and a secure IV-based encryption scheme gives a secure PKE scheme.  Note that the underlying IV-based encryption scheme need only be secure against adversaries asking a single query, meaning that even something like CBC/CTR with a fixed IV works!


Author: Tom Shrimpton

Associate Professor of Computer Science, University of Florida

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s