2025-04-17 | Work Programme | Version 2.3.3 |
![]() |
Work Item Reference | ETSI Doc. Number |
STF | Technical Body in Charge |
Download Standard![]() ![]() |
||
DTS/CYBER-QSC-0023 | TS 104 015 | CYBER QSC | |||||
Current Status (Click to View Full Schedule) |
Latest Version |
Cover Date | Standstill | Creation Date | |||
|
1.1.1 | 2025-02-26 | View Standstill Information | 2023-05-15 | |||
Rapporteur | Technical Officer | Harmonised Standard | |||||
Chloé Hébant
![]() |
Kim Nordström
![]() |
No | |||||
Title |
Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies |
||||||
Scope and Field of Application |
This work item will provide a framework to build key encapsulation mechanisms (KEMs) retaining both pre- and post-quantum securities through hybridization, with additional features for practical uses, while being efficient enough for browser or mobile use: namely, keys will be encapsulated with respect to user-attribute subset covers, the encapsulations will be anonymous, and any user having attributes fulfilling the encapsulation policy will be able retrieve the keys, while those who do not fit the policy will not have this possibility. As many users could have the same attributes, one can also wish for an additional tracing feature, in which a tracing authority could have means to distinguish users with the same attributes. It will also explain how such a KEM can be combined with a secure data encapsulation mechanism (DEM) to provide a secure public-key encryption scheme in the KEM-DEM paradigm from [Shoup’01], and other useful applications, such as in anonymous authentication contexts. |
||||||
Supporting Organizations |
Cadzow Communications, CNIT, NCSC, Amazon Web Services, Cosmian |
|
Keywords | Projects | Clusters | Frequencies | Mandates | Directives | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
anonymity authentication encryption Key Exchange Quantum Safe Cryptography Traceability |
Security |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Official Journal |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Remarks |
|
Specific aspects | ||||
User/consumer aspects | ||||
Security/Privacy aspects |
![]() |
Any comments or problems with this application? Please let us know... | |