Add solution for 4g

This commit is contained in:
Tobias Eidelpes 2022-06-15 16:13:20 +02:00
parent 4e7777a8ea
commit 02a19502e1

View File

@ -206,7 +206,12 @@
IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve
IND-CCA2 security. IND-CCA2 security.
\item \TODO \item The scheme can be used to exchange symmetric keys between parties
with the usage of the key encapsulation mechanism (KEM). In that scenario,
the sender encrypts a symmetric key with LEDAcrypt and shares the
encrypted key with the other party. The other party then decrypts the
message to obtain the symmetric key which can be used for further
communication.
\item \TODO \item \TODO