Publication:
Indistinguishability Under Adaptive Chosen-Ciphertext Attack Secure Double-NTRU Key Encapsulation Mechanism

dc.authorscopusid57212212152
dc.authorscopusid15833929800
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.authorwosidSeyhan, Kübra/Iyj-3199-2023
dc.contributor.authorSeyhan, Kuebra
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.contributor.authorIDSeyhan, Kübra/0000-0002-0902-1903
dc.date.accessioned2025-12-11T01:21:19Z
dc.date.issued2023
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Seyhan, Kuebra; Akleylek, Sedat] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye; [Akleylek, Sedat] Ondokuz Mayis Univ Samsun, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Chair Secur & Theoret Comp Sci, Tartu, Estoniaen_US
dc.descriptionAkleylek, Sedat/0000-0001-7005-6489; Seyhan, Kübra/0000-0002-0902-1903;en_US
dc.description.abstractIn this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent's KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism.en_US
dc.description.sponsorshipTUBITAK [118E312]en_US
dc.description.sponsorshipFunding This work was supported by TUBITAK under Grant No. 118E312. There was no additional external funding received for this study. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.7717/peerj-cs.1391
dc.identifier.issn2376-5992
dc.identifier.pmid37346686
dc.identifier.scopus2-s2.0-85163756812
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.7717/peerj-cs.1391
dc.identifier.urihttps://hdl.handle.net/20.500.12712/43158
dc.identifier.volume9en_US
dc.identifier.wosWOS:001001964900001
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherPeerj Incen_US
dc.relation.ispartofPeerj Computer Scienceen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectKey Encapsulation Mechanismen_US
dc.subjectNTRUen_US
dc.subjectLattice-Based Cryptographyen_US
dc.titleIndistinguishability Under Adaptive Chosen-Ciphertext Attack Secure Double-NTRU Key Encapsulation Mechanismen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files