2017
DOI: 10.1007/978-3-319-52153-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 82 publications
(54 citation statements)
references
References 45 publications
0
54
0
Order By: Relevance
“…In the protocol, odd modulus and even errors are used when generating (Ring-)LWE samples, a hint bit is additionally sent from one party to the other to aid computing a least significant bit of a value dependent on each side's secret as a common value. By using Ding et al's reconciliation mechanism as a building block, subsequent works constructing versatile provably secure RLWE analogues of existing protocols based on DH problem, like Zhang et al's authenticated key exchange protocol [30] and Ding et al's password authenticated key exchange protocols [12], have emerged. In 2019, Ding's key exchange protocol [11] was instantiated with two set of parameters [16].…”
Section: Reconciliation-based Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In the protocol, odd modulus and even errors are used when generating (Ring-)LWE samples, a hint bit is additionally sent from one party to the other to aid computing a least significant bit of a value dependent on each side's secret as a common value. By using Ding et al's reconciliation mechanism as a building block, subsequent works constructing versatile provably secure RLWE analogues of existing protocols based on DH problem, like Zhang et al's authenticated key exchange protocol [30] and Ding et al's password authenticated key exchange protocols [12], have emerged. In 2019, Ding's key exchange protocol [11] was instantiated with two set of parameters [16].…”
Section: Reconciliation-based Approachmentioning
confidence: 99%
“…By a randomized tweak of hint function, the reconciled bit has the same probability to be 0 or 1 conditioned on the hint value. Ding et al's reconciliation mechanism is later used in constructing many advanced latticebased protocols, such as the authenticated key exchange protocols [12,30].…”
Section: Introductionmentioning
confidence: 99%
“…For authenticated key exchange (AKE) protocol, a RLWE-based protocol which is a RLWE analogue of HMQV was proposed by Zhang et al in 2015 [10]. Two provably secure password-based authenticated key exchange (PAKE) protocols that are RLWE analogues of PAK and PPK were given in 2017 [11]. These two works use same error reconciliation mechanism as DING12.…”
Section: Related Workmentioning
confidence: 99%
“…Based on the work of Ding et al [42], Bos et al applied the generic LWE in a scheme called Frodo [10]. A provably secure authenticated key exchange protocol applying the R-LWE was presented by Zhang et al [84] and a password authenticated key exchange scheme was presented by Ding et al [25].…”
Section: Schemes Based Latticesmentioning
confidence: 99%