A simple provably secure AKE from the LWE problem
From MaRDI portal
Publication:1992397
DOI10.1155/2017/1740572zbMATH Open1426.94154OpenAlexW2606554233WikidataQ59147307 ScholiaQ59147307MaRDI QIDQ1992397FDOQ1992397
Authors: Limin Zhou, Fengju Lv
Publication date: 5 November 2018
Published in: Mathematical Problems in Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2017/1740572
Recommendations
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
- Cryptanalysis of RLWE-based one-pass authenticated key exchange
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Authenticated key exchange from ideal lattices
- Strongly leakage-resilient authenticated key exchange
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- On ideal lattices and learning with errors over rings
- Public-key cryptosystems from the worst-case shortest vector problem
- On lattices, learning with errors, random linear codes, and cryptography
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Trapdoors for hard lattices and new cryptographic constructions
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Authenticated key exchange secure against dictionary attacks
- Classical hardness of learning with errors
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- Smooth projective hashing and password-based authenticated key exchange from lattices
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- A New Security Model for Authenticated Key Agreement
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Lattice cryptography for the internet
- Lattice-based key exchange on small integer solution problem
- Authenticated key exchange from ideal lattices
Cited In (3)
Uses Software
This page was built for publication: A simple provably secure AKE from the LWE problem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1992397)