Publication: Indistinguishability Under Adaptive Chosen-Ciphertext Attack Secure Double-NTRU Key Encapsulation Mechanism
| dc.authorscopusid | 57212212152 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorwosid | Akleylek, Sedat/D-2090-2015 | |
| dc.authorwosid | Seyhan, Kübra/Iyj-3199-2023 | |
| dc.contributor.author | Seyhan, Kuebra | |
| dc.contributor.author | Akleylek, Sedat | |
| dc.contributor.authorID | Akleylek, Sedat/0000-0001-7005-6489 | |
| dc.contributor.authorID | Seyhan, Kübra/0000-0002-0902-1903 | |
| dc.date.accessioned | 2025-12-11T01:21:19Z | |
| dc.date.issued | 2023 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Seyhan, Kuebra; Akleylek, Sedat] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye; [Akleylek, Sedat] Ondokuz Mayis Univ Samsun, Cyber Secur & Informat Technol Res & Dev Ctr, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Chair Secur & Theoret Comp Sci, Tartu, Estonia | en_US |
| dc.description | Akleylek, Sedat/0000-0001-7005-6489; Seyhan, Kübra/0000-0002-0902-1903; | en_US |
| dc.description.abstract | In this article, we propose a double-NTRU (D-NTRU)-based key encapsulation mechanism (KEM) for the key agreement requirement of the post-quantum world. The proposed KEM is obtained by combining one-way D-NTRU encryption and Dent's KEM design method. The main contribution of this article is to construct a D-NTRU-based KEM that provides indistinguishability under adaptive chosen-ciphertext attack (IND-CCA2) security. The IND-CCA2 analysis and primal/dual attack resistance of the proposed D-NTRU KEM are examined in detail. A comparison with similar protocols is provided regarding parameters, public/secret keys, and ciphertext sizes. The proposed scheme presents arithmetic simplicity and IND-CCA2 security that does not require any padding mechanism. | en_US |
| dc.description.sponsorship | TUBITAK [118E312] | en_US |
| dc.description.sponsorship | Funding This work was supported by TUBITAK under Grant No. 118E312. There was no additional external funding received for this study. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. | en_US |
| dc.description.woscitationindex | Science Citation Index Expanded | |
| dc.identifier.doi | 10.7717/peerj-cs.1391 | |
| dc.identifier.issn | 2376-5992 | |
| dc.identifier.pmid | 37346686 | |
| dc.identifier.scopus | 2-s2.0-85163756812 | |
| dc.identifier.scopusquality | Q1 | |
| dc.identifier.uri | https://doi.org/10.7717/peerj-cs.1391 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/43158 | |
| dc.identifier.volume | 9 | en_US |
| dc.identifier.wos | WOS:001001964900001 | |
| dc.identifier.wosquality | Q2 | |
| dc.language.iso | en | en_US |
| dc.publisher | Peerj Inc | en_US |
| dc.relation.ispartof | Peerj Computer Science | en_US |
| dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Post-Quantum Cryptography | en_US |
| dc.subject | Key Encapsulation Mechanism | en_US |
| dc.subject | NTRU | en_US |
| dc.subject | Lattice-Based Cryptography | en_US |
| dc.title | Indistinguishability Under Adaptive Chosen-Ciphertext Attack Secure Double-NTRU Key Encapsulation Mechanism | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication |
