Efficient CCA2-Secure IBKEM from Lattices in the Standard Model
Abstract
1. Introduction
1.1. Contribution
1.2. Our Approach
- (i)
- and ;
- (ii)
- and ;
- (iii)
- and .
1.3. Related Work
2. Preliminaries
2.1. Key Encapsulation Mechanism (KEM)
- : Given the security parameter λ, the algorithm outputs a public/secret key pair.
- : On input of the public key, it produces a ciphertext that encapsulates a random session key, and outputs the pair.
- : Using the public key, the ciphertext, and the secret key, it recovers the corresponding session key if the ciphertext is valid; otherwise it returns the rejection symbol ⊥.
- Setup: runs to generate and gives T to , while keeping secret.
- Phase 1: may query the decapsulation oracle on any ciphertexts of its choice and receive the corresponding session keys.
- Challenge: The challenger generates and chooses a random session key in the key space. Then picks a bit randomly and sends to .
- Phase 2: continues to query on any ciphertext .
- Guess: Finally, outputs a bit and wins if .
2.2. Identity Based Key Encapsulation Mechanism (IBKEM)
- : Given the security parameter λ, the algorithm produces a master public key and a master secret key, denoted .
- : On input of the master keys and an identity , the algorithm outputs the secret key associated with that identity.
- : Using the master public key and the target identity , the algorithm generates a ciphertext that encapsulates a random session key . It then returns .
- : Given the master public key, a ciphertext, and the identity’s secret key, the algorithm recovers the session key if the ciphertext is valid; otherwise it outputs ⊥.
- Setup: The challenger executes to produce a master key pair . It provides to the adversary while keeping secret.
- Initial: declares a target identity .
- Phase 1: The adversary may issue a polynomial number of queries to two oracles, in any sequence:
- –
- : On input of an identity , it outputs the corresponding private key .
- –
- : Given an identity and a ciphertext , it returns the session key using the secret key associated with the identity .
- Challenge: The challenger computes and chooses a random session key in the key space. Then selects a bit randomly and sends the pair to .
- Phase 2: continues to query both oracles under the restrictions that
- –
- The challenge identity is never used in .
- –
- The pair cannot be submitted to .
All other queries are answered as in Phase 1. - Guess: Finally, outputs a bit . It wins if .
2.3. Lattices
- Sample and for an invertible .
- Output together with trapdoor .
- is computationally indistinguishable from uniform.
- For any with , with , there exists an algorithm that, with overwhelming probability, recovers and .
Hardness Assumptions
- :
- Returns pairs , where is uniformly sampled from and is a noise withdrawn from χ.
- :
- Returns uniformly random pairs in .
3. CCA2-Secure KEM in the Standard Model
3.1. Parameters
- Let be the security parameter and suppose that all parameters are functions of .
- Let denote a large prime modulus, and let represent the number of rows in the public matrix.
- Following [1], the secret key is an matrix. To ensure correctness, their work requires that . However, in their security proof, the simulator needs to sample a trapdoor such that has a left inverse modulo q. This requires , which is not noticed in [1]. Therefore, in our scheme, we set and let R be a square matrix of size m.
- is an error rate with the requirement that is sufficiently large.
- Set to be a Gaussian parameter.
- Let be the matrix obtained by adding zero columns to the right of the gadget matrix .
- We use the problem where we denote by the discrete Gaussian distribution parameterized by .
- is a conditional distribution over , defined as , such that the resulting matrices are -invertible with .
- is a full-rank difference encoding (FRD) introduced in [8] such that every image is an invertible matrix and so is for all distinct .
- is a hash function that is second-pre-image resistant. Without loss of generality, we assume that an efficiently computable injective encoding exists so that each hash output can be represented as an element of .
3.2. Construction
- Setup().
- Given a security parameter , the algorithm proceeds as follows.
- Choose a second-pre-image resistant hash function .
- Generate a random matrix and a trapdoor matrix .
- Define .
- Sample another uniform matrix .
- Output
- Encap().
- On inputting the pubic key , the encapsulation algorithm works as follows:
- Draw a random key seed .
- Sample noise vectors , .
- Set where .
- Compute .
- Compute and .
- Compute .(To reduce the ciphertext size, we can set and then encode it as an element in prior to being input to ).
- Return the ciphertext and the session key .
- Decap().
- Given the public key , a ciphertext , and the secret key , the decapsulation procedure proceeds as follows:
- Parse ; if the format is invalid, output ⊥.
- Form , then recover using .
- If either or , reject and output ⊥.
- Compute ; if the result differs from , output ⊥.
- For each coordinate , determine the corresponding bit if is closer to 0 or if is closer to .
- If output ; otherwise, output ⊥.
3.3. Correctness
3.4. Security Analysis
- Game 0.
- This initial game matches the standard selective IND-CCA2 experiment between adversary and challenger . The challenger runs KeyGen() to obtain a public/secret key pair , and forward to . It chooses uniformly random and sets . computes the challenge ciphertext :where , together with a valid session key and a random session key . A random bit is selected and is sent to . The challenger subsequently answers the decapsulation queries by invoking the genuine decapsulation procedure. The adversary outputs a bit and wins the game if . This completes the description of Game 0, which coincides with the real IND-CCA2 attack experiment:
- Game 1.
- Let denote the event that the adversary asks the decapsulation oracle to decap with . Game 1 is the same as Game 0 unless the decapsulation oracle rejects if the event happens.Assume that event happens, then the corresponding errors in the valid ciphertext must satisfy w.h.p., and thus w.h.p. However, as and , one has . This implies that the probability that happens is negligible, i.e., . We note that Game 0 is similar to Game 1 except that happens. This implies that Game 0 and Game 1 differ in the adversary’s view only up to a negligible distance.
- Game 2.
- Game 2 is the same as Game 1 except in the case that does not accept with .Denote by the event that outputs where . Assume that happens. Then, we have . As is collision resistant under pre-image , we obtain and w.h.p. As is valid, , and , we deduce that w.h.p.Assume that the decapsulation query is a valid ciphertext where , with the corresponding errors . Then, challenger can use its trapdoor and run a decapsulation algorithm to recover .
- Consider the case that . As , we have . Then, challenger is able to find as a solution for the SIS problem. Therefore, such a case happens with negligible probability. One has
- If , then, as , we have . As , we have . This implies that . By Lemma 5.3 in [18], it happens with negligible probability.
In short, as Game 2 is the same as Game 1 except in the case that happens, we have - Game 3.
- Game 3 is similar to Game 2 except that we modify the way that the public parameters are generated and the way the challenge ciphertext is constructed, as follows:
- Select to be a hash function.
- Sample and .
- Sample of rank m. Find such that . According to the definition of the distribution , sampling such matrix is successful with a high probability.
- Choose .
- Choose , and set .
- Compute .
- Choose , and set .
- Compute , and .
- Set .
- Set the public key , secret key , challenge ciphertext , and the valid session key .
Challenger sends , , and together with the session key .Here, to respond to the decapsulation queries, the challenger in Game 3 computesNote that rejects any if . If , then is an invertible matrix so is still a -trapdoor for , which enables the decapsulation oracle to provide answers to queries.Note that and are correctly distributed as in the previous game. As , by Lemma 3, in ’s view, in Game 3 and in Game 2 are statistically close as well as statistically close to uniform over . In addition, is sampled uniformly at random in , and we obtain that is uniformly random in as in Game 2. Thus, the public parameters in Game 3 and Game 2 are indistinguishable.In this game, is correctly distributed. Moreover, according to Theorem 1, is statistically close to where . defined in step (8) above also satisfiesMoreover, we haveTherefore, in Game 3 is correctly distributed as in the previous game.Hence, in ’s view, Game 3 and Game 2 are indistinguishable. - Game 4.
- Game 4 is similar to Game 3 unless both session key and are sampled uniformly at random. In this case, does not have any advantage, i.e.,We need to show that distinguishing between Game 4 and Game 3 is reduced to solving the problem.Suppose can distinguish between Games 4 and Game 3 with non-negligible probability. We will construct an algorithm to solve the SISnLWE problem.Recall from Definition 8 that an SISnLWE problem instance provides its challenge where and and asks if there is a vector such that or if is random. The challenger utilizes and proceeds as follows:
- Select a hash function .
- Set from the SISnLWE challenge.
- Sample and find such that .
- Set so that .
- Sample .
- Set with from the challenge.
- Select and set .
- Define and .
- Set .
- Set , , . Set and choose a random session key in the key space.
- Return , , and with and keep secret.
- The challenger answer and as in the previous game.
When the SISnLWE oracle is pseudorandom, meaning that , we haveandwhere and . Therefore, is distributed exactly as in Game 3.When the SISnLWE oracle is random, we have that is uniform in . Thus, in step (7) and in step (6) above are uniform in . In particular, the challenge session keys are uniform and do not depend on as in Game 4. Hence, ’s advantage in solving the SISnLWE problem is the same as ’s advantage in distinguishing Game 3 and Game 4, i.e.,From the above, one hasThis completes the proof.
4. CCA2-Secure IBKEM in the Standard Model
4.1. Parameters
- Let be prime, be positive, and set .
- Let be the gadget matrix and be the matrix obtained by adding zero columns to the right of .
- is an error rate for LWE such that .
- We use the problem.
- is a distribution on defined as conditioned on the resulting matrix being -invertible where .
- is a Gaussian parameter.
- .
4.2. Construction
- Setup().
- On input security parameter , it proceeds as follows:
- Choose a second-pre-image collision resistant hash function .
- Select uniformly random matrices and .
- Set .
- Sample uniformly random matrices , .
- Return the master key pair
- Extract().
- On inputting the master pubic key , the master secret key , and an identity , the algorithm proceeds as follows:
- Compute .
- Sample s.t. .
- Return secret key .
- Encap().
- On inputting the master pubic key and an identity , the algorithm proceeds as follows:
- Sample .
- Sample noise vectors , .
- Set where .
- Compute .
- Compute and .
- Compute .
- Return and the session key .
- Decap().
- On inputting , it uses to decap as follows:
- Parse ; output ⊥ if does not parse.
- Set and recover via .
- If or , output ⊥.
- If , output ⊥.
- Set if the i-th coordinate of is closer to 0 or if is closer to .
- If then return the session key ; otherwise, return ⊥.
4.3. Correctness
4.4. Security Analysis
- Game 0.
- It is the selectively security game between and an challenger.After receiving the challenge identity from , the challenger operates to generate and . Then, sends through to , keeps secret, chooses uniformly random , , and sets . It then computes the challenge ciphertext :where , together with a valid session key , and samples a random session key from the key space . Finally, picks a random bit and sends the pair through to the adversary .The challenger implements the key extraction oracle and the decapsulation oracle by following the real algorithms in the construction. The adversary returns a bit and wins the game if . By the definition, we have
- Game 1.
- Game 1 is identical to Game 0 except that the decapsulation oracle rejects any ciphertext of the challenge identity if .Let be the event that the adversary issues a decap of of where .Assuming that event happens, we have . Because of the pre-image collision resistance of H, and w.h.p. As is valid, , and , we obtain w.h.p.Assume that the decapsulation query is a valid ciphertext , where , with the corresponding errors . Then, the challenger can use its trapdoor and run a decapsulation algorithm to recover .
- If , then, as , we must have with overwhelming probability, and is actually a solution for the SIS problem. Such a case happens with negligible probability. We have
- If , then, as , we have . As , we have . This implies that . This happens with negligible probability by Lemma 5.3 [22].
In short, as Game 1 is the same as Game 0 unless happens, then - Game 2.
- Game 2 is similar to Game 1 unless that we modify the way is generated and the way together with the valid session are constructed, as follows:
- Select a hash function .
- Sample and .
- Sample and set . Find such that .We can successfully sample such matrix of rank m with an overwhelming probability.
- Set .
- Sample , and set .
- Compute .
- Sample , and set .
- Compute , , and .
- Set .
- Set .
- Set , , , and the valid session key .
Challenger sends and together with the session key to .- We do not allow to query for . To answer the key extraction query for , the challenger computesBy the property of , is an invertible matrix in , so can sample
- Let be the event that asks for the decapsulation queries of identity . Let the game abort when event happens.Note that the case consists of the case and the case . This means that Game 2 aborts if .
- To answer to the decapsulation oracle of a valid of with , the challenger computesand sets the secret key .As , is invertible, so the decapsulation oracle is able to respond to valid ciphertext by invoking to recover and .
Note that is correctly distributed as in the previous game. As , by using Lemma 3, in ’s view, the matrices , in Game 2 and in Game 1 are indistinguishable and statistically close to uniform over . In addition, is chosen uniformly at random in , so is a uniformly random matrix in as in Game 1. Hence, the public parameters in Game 2 and Game 1 are indistinguishable.In this game, is correctly distributed. By Theorem 1, we have that is statistically close to asThe vector defined in step (8) above also satisfiesMoreover, we haveTherefore, in Game 2 is correctly distributed as in the previous game.Hence, in ’s view, Game 2 and Game 1 are indistinguishable. - Game 3.
- Game 3 is similar to Game 2 unless and are uniformly random. We haveWe now show that Game 3 and Game 2 are computationally indistinguishable by reducing to the problem.Suppose the adversary can distinguish Game 3 and Game 2 with non-negligible advantage. We will then build the simulator that can solve the SISnLWE problem. Recall from Definition 8 that an SISnLWE problem instance provides its challenge , where and , and asks if there is a vector such that or if is random. uses as follows:
- Choose a hash function .
- Set from the SISnLWE challenge.
- Sample and set is of rank m. Find such that
- Set .
- Sample .
- Set where is from the SISnLWE challenge.
- Sample and set .
- Set and .
- Set .
- Set .
- Set , , . Set and choose randomly in the key space.
- sends the triple , and where and keeps secret.
- The simulator answers queries to and as in the previous game.
- When receives as a guess for b from , it outputs as a solution to the SISnLWE challenge.
We provide the argument that when the SISnLWE oracle is pseudorandom, meaning , is distributed exactly as in Game 2. Note thatandwhere and .Moreover, by Lemma 4 any valid is distributed statistically close to uniform in .When the SISnLWE oracle is random, we have that is uniform in . Thus, defined in step (7) and in step (6) above are uniform in . In particular, the challenge session keys are uniform and independent of as in Game 3.We conclude that the advantage of in solving the SISnLWE problem is the same as the advantage of in distinguishing Game 2 and Game 3, i.e.,It remains to be shown that the abort event happens with negligible probability under the hardness assumption of the Computational SISnLWE problem. Indeed, we can construct a simulator similarly to where can solve the Computational SISnLWE problem when adversary provides with a valid ciphertext , where for an identity . Given a Computational SISnLWE instance , runs as step 1 to step 12 of . Consider the case where adversary provides with a valid ciphertext for an identity As , we have w.h.p, meaning that and w.h.p. We must have , , with overwhelming probability where and .As is a valid ciphertext for , we deduce thatSet where . As is invertible and is a gadget matrix, there exists such that . Therefore, the simulator is able to find by calculating and then finding , which solves the Computational SISnLWE problem.We deduce that the probabilityCombining all of the inequalities above, we have thatThis concludes the proof.
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Boyen, X.; Izabachène, M.; Li, Q. A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model. In Proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN 2020, Amalfi, Italy, 14–16 September 2020; Galdi, C., Kolesnikov, V., Eds.; Springer: Cham, Switzerland, 2020; pp. 321–337. [Google Scholar]
- Boneh, D.; Canetti, R.; Halevi, S.; Katz, J. Chosen-Ciphertext Security from Identity-Based Encryption. SIAM J. Comput. 2007, 36, 1301–1328. [Google Scholar] [CrossRef]
- Peikert, C.; Vaikuntanathan, V.; Waters, B. A Framework for Efficient and Composable Oblivious Transfer. In Proceedings of the 28th Annual International Cryptology Conference, Advances in Cryptology—CRYPTO 2008, Santa Barbara, CA, USA, 17–21 August 2008; Proceedings; Lecture Notes in Computer Science. Wagner, D.A., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5157, pp. 554–571. [Google Scholar] [CrossRef]
- Boyen, X.; Li, Q. Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. In Proceedings of the 10th International Conference, PQCrypto 2019, Chongqing, China, 8–10 May 2019; Revised Selected Papers; Lecture Notes in Computer Science. Ding, J., Steinwandt, R., Eds.; Springer: Cham, Switzerland, 2019; Volume 11505, pp. 116–130. [Google Scholar] [CrossRef]
- Bellare, M.; Kiltz, E.; Peikert, C.; Waters, B. Identity-Based (Lossy) Trapdoor Functions and Applications. In Proceedings of the Advances in Cryptology–EUROCRYPT 2012–31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Proceedings; Lecture Notes in Computer Science. Pointcheval, D., Johansson, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7237, pp. 228–245. [Google Scholar] [CrossRef]
- Boyen, X.; Mei, Q.; Waters, B. Direct chosen ciphertext security from identity-based techniques. In Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, 7–11 November 2005; Atluri, V., Meadows, C.A., Juels, A., Eds.; ACM: New York, NY, USA, 2005; pp. 320–329. [Google Scholar] [CrossRef]
- Micciancio, D.; Peikert, C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 700–718. [Google Scholar]
- Agrawal, S.; Boneh, D.; Boyen, X. Efficient lattice (H)IBE in the standard model. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 553–572. [Google Scholar]
- Jager, T.; Kurek, R.; Niehues, D. Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. In Proceedings of the Public-Key Cryptography–PKC 2021–24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, 10–13 May 2021; Proceedings, Part I; Lecture Notes in Computer Science. Garay, J.A., Ed.; Springer: Cham, Switzerland, 2021; Volume 12710, pp. 596–626. [Google Scholar] [CrossRef]
- Agrawal, S.; Boneh, D.; Boyen, X. Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In Proceedings of the Advances in Cryptology–CRYPTO 2010—30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 August 2010; Rabin, T., Ed.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 98–115. [Google Scholar]
- Zhang, J.; Yu, Y.; Fan, S.; Zhang, Z. Improved lattice-based CCA2-secure PKE in the standard model. Sci. China Inf. Sci. 2020, 63, 182101. [Google Scholar] [CrossRef]
- Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C. Bonsai trees, or how to delegate a lattice basis. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 523–552. [Google Scholar]
- Yamada, S. Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques. In Proceedings of the Annual International Cryptology Conference, 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; Springer: Cham, Switzerland, 2017; pp. 161–193. [Google Scholar]
- Zhang, J.; Chen, Y.; Zhang, Z. Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. In Proceedings of the Advances in Cryptology–CRYPTO 2016–36th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2016; Proceedings, Part III; Lecture Notes in Computer Science. Robshaw, M., Katz, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2016; Volume 9816, pp. 303–332. [Google Scholar] [CrossRef]
- Qiao, Z.; Zhu, Y.; Zhou, Y.; Yang, B. A continuous leakage-resilient CCA secure identity-based key encapsulation mechanism in the standard model. J. Syst. Archit. 2025, 162, 103388. [Google Scholar] [CrossRef]
- Li, Y.; Wang, C.; Hu, S. KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-receiver Key Encapsulation. In Proceedings of the Information Security and Privacy, 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, 14–16 July 2025; Susilo, W., Pieprzyk, J., Eds.; Springer: Singapore, 2025; pp. 105–123. [Google Scholar]
- Tomita, T.; Ogata, W.; Kurosawa, K. CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions. In Proceedings of the Advances in Information and Computer Security, 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, 28–30 August 2019; Attrapadung, N., Yagi, T., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 3–22. [Google Scholar]
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions. Electron. Colloq. Comput. Complex. 2008, 14. [Google Scholar]
- Regev, O. On lattices, learning with errors, random linear codes, and cryptography. J. ACM 2009, 56, 34. [Google Scholar] [CrossRef]
- Genise, N.; Micciancio, D.; Peikert, C.; Walter, M. Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography. In Proceedings of the 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, 4–7 May 2020; Lecture Notes in Computer Science. Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V., Eds.; Springer: Cham, Switzerland, 2020; Volume 12110, pp. 623–651. [Google Scholar]
- Shoup, V. Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology ePrint Archive, Report 2004/332. 2004. Available online: https://ia.cr/2004/332 (accessed on 2 December 2025).
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 17–20 May 2008; Dwork, C., Ed.; ACM: New York, NY, USA, 2008; pp. 197–206. [Google Scholar]
| Param. | Security | Type | |||
|---|---|---|---|---|---|
| MP12 [7] | CCA1 | PKE | |||
| MP12-MAC [2,7] | CCA2 | PKE | |||
| MP12-SIG [2,7] | CCA2 | PKE | |||
| This work | CCA2 | KEM |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nguyen, N.A.V.; Duong, D.H.; Pham, M.T.T. Efficient CCA2-Secure IBKEM from Lattices in the Standard Model. Cryptography 2025, 9, 79. https://doi.org/10.3390/cryptography9040079
Nguyen NAV, Duong DH, Pham MTT. Efficient CCA2-Secure IBKEM from Lattices in the Standard Model. Cryptography. 2025; 9(4):79. https://doi.org/10.3390/cryptography9040079
Chicago/Turabian StyleNguyen, Ngoc Ai Van, Dung Hoang Duong, and Minh Thuy Truc Pham. 2025. "Efficient CCA2-Secure IBKEM from Lattices in the Standard Model" Cryptography 9, no. 4: 79. https://doi.org/10.3390/cryptography9040079
APA StyleNguyen, N. A. V., Duong, D. H., & Pham, M. T. T. (2025). Efficient CCA2-Secure IBKEM from Lattices in the Standard Model. Cryptography, 9(4), 79. https://doi.org/10.3390/cryptography9040079

