Add solution for 4g
This commit is contained in:
parent
4e7777a8ea
commit
02a19502e1
@ -206,7 +206,12 @@
|
||||
IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve
|
||||
IND-CCA2 security.
|
||||
|
||||
\item \TODO
|
||||
\item The scheme can be used to exchange symmetric keys between parties
|
||||
with the usage of the key encapsulation mechanism (KEM). In that scenario,
|
||||
the sender encrypts a symmetric key with LEDAcrypt and shares the
|
||||
encrypted key with the other party. The other party then decrypts the
|
||||
message to obtain the symmetric key which can be used for further
|
||||
communication.
|
||||
|
||||
\item \TODO
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user