[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["缺少我需要的資訊","missingTheInformationINeed","thumb-down"],["過於複雜/步驟過多","tooComplicatedTooManySteps","thumb-down"],["過時","outOfDate","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["示例/程式碼問題","samplesCodeIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-03-03 (世界標準時間)。"],[[["Hybrid Encryption combines symmetric and asymmetric encryption for efficient and secure data exchange, allowing anyone to encrypt with a public key but only the private key holder to decrypt."],["It ensures confidentiality through randomization and requires the same context information used during encryption for successful decryption."],["Tink recommends the `DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM` key type, implementing the HPKE standard for robust security."],["While providing privacy, Hybrid Encryption does not inherently guarantee authenticity, requiring separate sender authentication mechanisms if needed."]]],["Hybrid Encryption combines public key cryptography's convenience with symmetric encryption's efficiency. Senders generate a symmetric key to encrypt each message's plaintext and encapsulate it with the recipient's public key. Recipients decapsulate the key and decrypt the ciphertext. It ensures secrecy, asymmetry, and randomization. It includes `context_info`, public data that binds to the ciphertext for integrity checks. `DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM` is recommended, implementing HPKE for key encapsulation, derivation, and authenticated encryption. It only provides privacy, not authenticity.\n"]]