We know that key exchange is a less "advanced" cryptographic primitive than public key encryption. In the first paper of public key cryptography, [Diffie and Hellman][1] has mentioned that they were able to design a key exchange protocol (Diffie-Hellman key exchange) but they couldn't design a public key encryption scheme as they couldn't find a one-way function with a proper *trapdoor*.
[Russell Impagliazzo][2] had introduced five worlds and has shown that (roughly speaking) if one-way functions exist then symmetric key encryption (SKE) and key exchange (KE) schemes exists, i.e., $\text{one-way function}\implies\text{SKE, KE}$. But this this condition is not enough to say that public key encryption (PKE) schemes exist, i.e, $\text{one-way function}\not \hspace{-2mm}\implies\text{PKE}$.
[Victor Shoup][3] in designing a very efficient public key encryption schemes coined the term "key encapsulation mechanism" (KEM) as a special case of a public key encryption. He claimed that we can build PKE from KEM by just encrypting a *random* message as the shared key which will be the output of the encapsulation algorithm of the KEM. But, *we can design KEMs more efficient than PKEs*. So, we care about KEM as a new notion and cryptographic primitive. Now, my question is:
1. Is the security definition (like IND-CCA) for a KEM weaker than the same security definition for PKE, since in a KEM just *random* messages are alowed to be encrypted? (Because the adversary has to distinguish between ciphertexts of two messages where one of them is random and not chosen by themselves)
2. What exactly makes KEM schemes more efficient than corresponding PKE schemes?
3. Why is it possible to construct more efficient KEM schemes than PKE schemes? Because the KEM security definition in weaker than the PKE security definition and allows us to achieve the same security by using the same "unkind" hardness assumption which was impossible in the case of proving security for PKE.
**My main question is**
4. Can we build KEMs from PKEs in a black-box manner, i.e., $\text{KEM}\implies\text{PKE}$ ? Especially is it trivial to build a PKE counter-part for CRYSTALS-kyber KEM (the NIST's PQC standard, ML-KEM)?
[1]: https://ee.stanford.edu/~hellman/publications/24.pdf
[2]: https://cseweb.ucsd.edu/~russell/secret.ps
[3]: https://shoup.net/papers/iso-2_1.pdf