2011
DOI: 10.1007/978-3-642-20465-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Authentication from Hard Learning Problems

Abstract: Abstract. We construct efficient authentication protocols and messageauthentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem.Despite a large body of work -starting with the HB protocol of Hopper and Blum in 2001 -until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle (MIM) attacks. A MAC implies such a (two-round) protocol.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
71
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 75 publications
(71 citation statements)
references
References 28 publications
0
71
0
Order By: Relevance
“…Let n = O( ) denote the number of repetitions, γ the parameter of the Bernoulli distribution, and γ := 1/4 + γ/2 controls the correctness error. The following authentication protocol Auth LPN = {Gen , P , V } originates from [20]. It has associated key space…”
Section: Instantiations From Lpnmentioning
confidence: 99%
See 4 more Smart Citations
“…Let n = O( ) denote the number of repetitions, γ the parameter of the Bernoulli distribution, and γ := 1/4 + γ/2 controls the correctness error. The following authentication protocol Auth LPN = {Gen , P , V } originates from [20]. It has associated key space…”
Section: Instantiations From Lpnmentioning
confidence: 99%
“…In contrast, this paper contributes to a line of work [16,18,13,19,20,10,15,22] on building provably-secure authentication protocols with security reductions to the learning parity with noise (LPN) and related problems that are as efficient as possible, meaning that key-size, communication, and rounds are minimized. LPN problem provides confidence in security due to the failure to find polynomial-time algorithms for it and its variants, despite wide interest [7,21,5], and finding constructions of cryptographic primitives based on LPN has given rise to a substantial body of works [6,14,2,17].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations