Two-round PAKE from approximate SPH and instantiations from lattices
From MaRDI portal
Publication:1701433
DOI10.1007/978-3-319-70700-6_2zbMATH Open1417.94088OpenAlexW2769568011MaRDI QIDQ1701433FDOQ1701433
Authors: Jiang Zhang, Yu Yu
Publication date: 23 February 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70700-6_2
Recommendations
- Two-round PAKE protocol over lattices without NIZK
- PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
- Smooth projective hashing and password-based authenticated key exchange from lattices
- New techniques for SPHFs and efficient one-round PAKE protocols
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
Cited In (17)
- Efficient password-authenticated key exchange from RLWE based on asymmetric key consensus
- A gapless code-based hash proof system based on RQC and its applications
- A generic construction of tightly secure password-based authenticated key exchange
- How not to create an isogeny-based PAKE
- Smooth projective hashing and password-based authenticated key exchange from lattices
- New framework of password-based authenticated key exchange from only-one lossy encryption
- New techniques for SPHFs and efficient one-round PAKE protocols
- Towards isogeny-based password-authenticated key establishment
- Almost tight multi-user security under adaptive corruptions from LWE in the standard model
- Lattice-based authenticated key exchange with tight security
- Two-round PAKE protocol over lattices without NIZK
- Multi-theorem preprocessing NIZKs from lattices
- Universal composable password authenticated key exchange for the post-quantum world
- A gapless post-quantum hash proof system in the Hamming metric
- GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges
- PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model
- Covert authentication from lattices
This page was built for publication: Two-round PAKE from approximate SPH and instantiations from lattices
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1701433)