2020
DOI: 10.1007/978-3-030-61078-4_6
|View full text |Cite
|
Sign up to set email alerts
|

Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

Abstract: The rapid proliferation of Radio Frequency Identification (RFID) tags in the past decade has made tremendous impact on our daily lives. As part of Internet of Things (IoT), RFID technology ensures an efficient, secure and reliable system to identify tagged objects in supply chain environment such as manufacturing, automotive and healthcare. Several lightweight authentication solutions have been proposed to satisfy optimal security and privacy features of RFID communication. Hopper-Blum (HB) family of protocols… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 35 publications
0
1
0
Order By: Relevance
“…The security of these protocols reduces to a Diffie-Hellman-like version of the decisional R-LWE problem, shown by Bos, Costello, Naehrig, and Stebila [9] to have comparable security to the decisional R-LWE problem. These GKEs were presented at ICICS 2020 [10] in a preliminary version. We extend these results by creating a compiler that turns both of our previous protocols into AGKEs, while maintaining logarithmic order complexities.…”
Section: Introductionmentioning
confidence: 99%
“…The security of these protocols reduces to a Diffie-Hellman-like version of the decisional R-LWE problem, shown by Bos, Costello, Naehrig, and Stebila [9] to have comparable security to the decisional R-LWE problem. These GKEs were presented at ICICS 2020 [10] in a preliminary version. We extend these results by creating a compiler that turns both of our previous protocols into AGKEs, while maintaining logarithmic order complexities.…”
Section: Introductionmentioning
confidence: 99%