Research Article
Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption
Figure 8
Construction of PKE from . The shadowed parts highlight algorithms of KEM and . Here , in are not provided in , since they are not used in and of .