Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism

In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent’s KEM design method. The main contribution of this article is to constr...

Full description

Bibliographic Details
Main Authors: Kübra Seyhan, Sedat Akleylek
Format: Article
Language:English
Published: PeerJ Inc. 2023-05-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-1391.pdf