We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the HB protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol. © 2016, International Association for Cryptologic Research.
Efficient authentication from hard learning problems / Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek. - In: JOURNAL OF CRYPTOLOGY. - ISSN 0933-2790. - 30:4(2016), pp. 1238-1275. [10.1007/s00145-016-9247-3]
Efficient authentication from hard learning problems
VENTURI, DANIELE;
2016
Abstract
We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the HB protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol. © 2016, International Association for Cryptologic Research.File | Dimensione | Formato | |
---|---|---|---|
Kiltz_Authentication_2016.pdf
solo gestori archivio
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
953.08 kB
Formato
Adobe PDF
|
953.08 kB | Adobe PDF | Contatta l'autore |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.