2012
DOI: 10.1007/978-3-642-34047-5_20
|View full text |Cite
|
Sign up to set email alerts
|

Lapin: An Efficient Authentication Protocol Based on Ring-LPN

Abstract: Abstract. We propose a new authentication protocol that is provably secure based on a ring variant of the learning parity with noise (LPN) problem. The protocol follows the design principle of the LPN-based protocol from Eurocrypt'11 (Kiltz et al.), and like it, is a two round protocol secure against active attacks. Moreover, our protocol has small communication complexity and a very small footprint which makes it applicable in scenarios that involve low-cost, resourceconstrained devices.Performance-wise, our… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
60
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 52 publications
(60 citation statements)
references
References 26 publications
0
60
0
Order By: Relevance
“…In contrast, this paper contributes to a line of work [16,18,13,19,20,10,15,22] on building provably-secure authentication protocols with security reductions to the learning parity with noise (LPN) and related problems that are as efficient as possible, meaning that key-size, communication, and rounds are minimized. LPN problem provides confidence in security due to the failure to find polynomial-time algorithms for it and its variants, despite wide interest [7,21,5], and finding constructions of cryptographic primitives based on LPN has given rise to a substantial body of works [6,14,2,17].…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…In contrast, this paper contributes to a line of work [16,18,13,19,20,10,15,22] on building provably-secure authentication protocols with security reductions to the learning parity with noise (LPN) and related problems that are as efficient as possible, meaning that key-size, communication, and rounds are minimized. LPN problem provides confidence in security due to the failure to find polynomial-time algorithms for it and its variants, despite wide interest [7,21,5], and finding constructions of cryptographic primitives based on LPN has given rise to a substantial body of works [6,14,2,17].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, the parallel nature of LPN-based protocols seems difficult to achieve with factoring or discrete-log type assumption. The potential efficiency benefits of LPN-based implementations are a subject of ongoing research, which has identified some advantageous scenarios [15] but also invented faster attacks [21]. We thus focus on developing techniques for protocol design and theoretical analysis that beat previous asymptotic runtimes, key sizes, and round complexity of protocols with similar security reductions.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations