“…In contrast, this paper contributes to a line of work [16,18,13,19,20,10,15,22] on building provably-secure authentication protocols with security reductions to the learning parity with noise (LPN) and related problems that are as efficient as possible, meaning that key-size, communication, and rounds are minimized. LPN problem provides confidence in security due to the failure to find polynomial-time algorithms for it and its variants, despite wide interest [7,21,5], and finding constructions of cryptographic primitives based on LPN has given rise to a substantial body of works [6,14,2,17].…”