Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies
ETSI TS 104 015 V1.1.1
Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025
ETSI - European Telecommunications Standards Institute
Subject: anonymity
Collections
:
-
Statistics
Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies
Show full item record
| contributor author | ETSI - European Telecommunications Standards Institute | |
| date accessioned | 2025-09-30T23:00:32Z | |
| date available | 2025-09-30T23:00:32Z | |
| date copyright | 2025.02 | |
| date issued | 2025 | |
| identifier other | ts_104015v010101p.pdf | |
| identifier uri | http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347715 | |
| language | English | |
| publisher | ETSI - European Telecommunications Standards Institute | |
| title | Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | en |
| title | ETSI TS 104 015 V1.1.1 | num |
| type | standard | |
| page | 21 | |
| status | Published | |
| tree | ETSI - European Telecommunications Standards Institute:;2025 | |
| contenttype | fulltext | |
| subject keywords | anonymity | |
| subject keywords | authentication | |
| subject keywords | encryption | |
| subject keywords | Key Exchange | |
| subject keywords | Quantum Safe Cryptography | |
| subject keywords | Traceability | |
| scope | This work item will provide a framework to build key encapsulation mechanisms (KEMs) retaining both pre- and post-quantum securities through hybridization, with additional features for practical uses, while being efficient enough for browser or mobile use: namely, keys will be encapsulated with respect to user-attribute subset covers, the encapsulations will be anonymous, and any user having attributes fulfilling the encapsulation policy will be able retrieve the keys, while those who do not fit the policy will not have this possibility. As many users could have the same attributes, one can also wish for an additional tracing feature, in which a tracing authority could have means to distinguish users with the same attributes. It will also explain how such a KEM can be combined with a secure data encapsulation mechanism (DEM) to provide a secure public-key encryption scheme in the KEM-DEM paradigm from [Shoup’01], and other useful applications, such as in anonymous authentication contexts. |

درباره ما