• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies

ETSI TS 104 015 V1.1.1

Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025

ETSI - European Telecommunications Standards Institute

URI: http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347715
Subject: anonymity
Collections :
  • ETSI - European Telecommunications Standards Institute
  • Download PDF : (251.8Kb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies

Show full item record

contributor authorETSI - European Telecommunications Standards Institute
date accessioned2025-09-30T23:00:32Z
date available2025-09-30T23:00:32Z
date copyright2025.02
date issued2025
identifier otherts_104015v010101p.pdf
identifier urihttp://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347715
languageEnglish
publisherETSI - European Telecommunications Standards Institute
titleCyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policiesen
titleETSI TS 104 015 V1.1.1num
typestandard
page21
statusPublished
treeETSI - European Telecommunications Standards Institute:;2025
contenttypefulltext
subject keywordsanonymity
subject keywordsauthentication
subject keywordsencryption
subject keywordsKey Exchange
subject keywordsQuantum Safe Cryptography
subject keywordsTraceability
scopeThis work item will provide a framework to build key encapsulation mechanisms (KEMs) retaining both pre- and post-quantum securities through hybridization, with additional features for practical uses, while being efficient enough for browser or mobile use: namely, keys will be encapsulated with respect to user-attribute subset covers, the encapsulations will be anonymous, and any user having attributes fulfilling the encapsulation policy will be able retrieve the keys, while those who do not fit the policy will not have this possibility. As many users could have the same attributes, one can also wish for an additional tracing feature, in which a tracing authority could have means to distinguish users with the same attributes. It will also explain how such a KEM can be combined with a secure data encapsulation mechanism (DEM) to provide a secure public-key encryption scheme in the KEM-DEM paradigm from [Shoup’01], and other useful applications, such as in anonymous authentication contexts.
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian