Y Liu, X Lu, B Li,
H Xue - Information Security and Cryptology–ICISC 2016 …, 2017 - Springer
We introduce a new notion, lossy key encapsulation mechanism (lossy KEM), which
enhances the notion of key encapsulation mechanism with lossiness, and can be more …