Improved attacks against key reuse in learning with errors key exchange
From MaRDI portal
Publication:2146089
DOI10.1007/978-3-030-88238-9_9zbMATH Open1491.94039OpenAlexW3095348168MaRDI QIDQ2146089FDOQ2146089
Authors: Nina Bindel, Douglas Stebila, Shannon Veitch
Publication date: 15 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-88238-9_9
Recommendations
- Efficient laconic cryptography from learning with errors
- A key exchange based on the short integer solution problem and the learning with errors problem
- Improving the security of exponential key exchange
- Improving key mismatch attack on NewHope with fewer queries
- From distinguishers to key recovery: improved related-key attacks on Even-Mansour
- Multi-key and multi-input predicate encryption from learning with errors
- Problem of learning with errors and modern cryptosystems
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Identity-based lossy encryption from learning with errors
- Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
Cites Work
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- New directions in cryptography
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Title not available (Why is that?)
- An efficient protocol for authenticated key agreement
- One-round key exchange in the standard model
- Lattice cryptography for the internet
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Authenticated key exchange from ideal lattices
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Cited In (8)
- Key reuse attack on NewHope key exchange protocol
- Complete attack on RLWE key exchange with reused keys, without signal leakage
- Limits on the efficiency of (ring) LWE-based non-interactive key exchange
- A one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attack
- A key exchange based on the short integer solution problem and the learning with errors problem
- Limits on the efficiency of (ring) LWE based non-interactive key exchange
- Post-quantum cryptography for healthcare: a number theory based two-factor mutual authentication and key exchange protocol over lattices for TMIS
- Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
Uses Software
This page was built for publication: Improved attacks against key reuse in learning with errors key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2146089)