Research Article

Efficient KDM-CCA Secure Public-Key Encryption via Auxiliary-Input Authenticated Encryption

Figure 8

Construction of PKE from . The shadowed parts highlight algorithms of KEM and . Here , in are not provided in , since they are not used in and of .