Module ibe::kem::cgw_fo

source ·
Available on crate feature cgwfo only.
Expand description

IND-ID-CCA2 secure IBKEM by a scheme by Chen, Gay and Wee.

CCA security due to a general approach by Fujisaki and Okamoto.

Symmetric primitives G and H instantiated using sha3_512 and sha3_256, respectively. To output a bigger secret SHAKE256 can be used with a bigger output buffer.

A drawback of a Fujisaki-Okamoto transform is that we now need the public key to decapsulate.

Re-exports

Structs

  • The CCA2 secure KEM that results by applying the implicit rejection variant of the Fujisaki-Okamoto transform to the Chen-Gay-Wee IBE scheme.
  • User secret key. Can be used to decaps the corresponding ciphertext. Also known as USK_{id}.

Constants

  • Size of the compressed user secret key in bytes.