From 02a19502e1b17694e42cbd6f1868bd82a70fdceb Mon Sep 17 00:00:00 2001 From: Tobias Eidelpes Date: Wed, 15 Jun 2022 16:13:20 +0200 Subject: [PATCH] Add solution for 4g --- exam/ex.tex | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/exam/ex.tex b/exam/ex.tex index 36ec555..1cbcd0b 100644 --- a/exam/ex.tex +++ b/exam/ex.tex @@ -206,7 +206,12 @@ IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve IND-CCA2 security. - \item \TODO + \item The scheme can be used to exchange symmetric keys between parties + with the usage of the key encapsulation mechanism (KEM). In that scenario, + the sender encrypts a symmetric key with LEDAcrypt and shares the + encrypted key with the other party. The other party then decrypts the + message to obtain the symmetric key which can be used for further + communication. \item \TODO