KEM + DEM Composition #
This file defines the textbook KEM+DEM public-key encryption construction and the proof-ladders A1 reduction skeleton against the repo's existing KEM and one-time IND-CPA interfaces.
Textbook KEM+DEM composition. The composed scheme inherits the KEM execution method.
Instances For
If a KEM and externally keyed DEM are both perfectly correct in the concrete probabilistic
semantics of m, then their composition is also perfectly correct.
Left KEM reduction from a one-time IND-CPA adversary against the composed KEM+DEM PKE.
Instances For
Right KEM reduction from a one-time IND-CPA adversary against the composed KEM+DEM PKE.
Instances For
DEM reduction from a one-time IND-CPA adversary against the composed KEM+DEM PKE. It samples
the public key and KEM ciphertext during the message-selection phase so that the simulatee sees
the same encaps-then-encrypt effect order as the composed scheme.
Instances For
Proof-ladders A1 reduction statement: the one-time IND-CPA advantage of textbook KEM+DEM is bounded by two KEM IND-CPA advantages plus one DEM IND-CPA advantage, using the canonical left/right and DEM reductions defined above.