March 22, 2023, 1:10 a.m. | Jean Belo Klamti, M. Anwar Hasan

cs.CR updates on arXiv.org arxiv.org

A key encapsulation mechanism (KEM) that takes as input an arbitrary string,
i.e., a tag, is known as tag-KEM, while a scheme that combines signature and
encryption is called signcryption. In this paper, we present a code-based
signcryption tag-KEM scheme. We utilize a code-based signature and an IND-CCA2
(adaptive chosen ciphertext attack) secure version of McEliece's encryption
scheme. The proposed scheme uses an equivalent subcode as a public code for the
receiver, making the NPcompleteness of the subcode equivalence problem …

attack called ciphertext code encryption hybrid input key public signature tag version

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

SOC Cyber Threat Intelligence Expert

@ Amexio | Luxembourg, Luxembourg, Luxembourg

Systems Engineer - SecOps

@ Fortinet | Dubai, Dubai, United Arab Emirates

Ingénieur Cybersécurité Gouvernance des projets AMR H/F

@ ASSYSTEM | Lyon, France

Senior DevSecOps Consultant

@ Computacenter | Birmingham, GB, B37 7YS