Add solution for 4g
This commit is contained in:
parent
4e7777a8ea
commit
02a19502e1
@ -206,7 +206,12 @@
|
|||||||
IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve
|
IND-CCA2. The authors use the Fujisaki-Okamoto transform to achieve
|
||||||
IND-CCA2 security.
|
IND-CCA2 security.
|
||||||
|
|
||||||
\item \TODO
|
\item The scheme can be used to exchange symmetric keys between parties
|
||||||
|
with the usage of the key encapsulation mechanism (KEM). In that scenario,
|
||||||
|
the sender encrypts a symmetric key with LEDAcrypt and shares the
|
||||||
|
encrypted key with the other party. The other party then decrypts the
|
||||||
|
message to obtain the symmetric key which can be used for further
|
||||||
|
communication.
|
||||||
|
|
||||||
\item \TODO
|
\item \TODO
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user