We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the HB protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol.

Efficient Authentication from Hard Learning Problems / Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek. - In: JOURNAL OF CRYPTOLOGY. - ISSN 0933-2790. - 2017, 30:4(2017), pp. 1238-1275. [10.1007/s00145-016-9247-3]

Efficient Authentication from Hard Learning Problems

Venturi, Daniele;
2017-01-01

Abstract

We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the HB protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol.
2017
4
Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek
Efficient Authentication from Hard Learning Problems / Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek. - In: JOURNAL OF CRYPTOLOGY. - ISSN 0933-2790. - 2017, 30:4(2017), pp. 1238-1275. [10.1007/s00145-016-9247-3]
File in questo prodotto:
File Dimensione Formato  
EC11.pdf

Open Access dal 01/11/2018

Descrizione: Full version
Tipologia: Post-print referato (Refereed author’s manuscript)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 504.84 kB
Formato Adobe PDF
504.84 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/160267
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 10
  • ???jsp.display-item.citation.isi??? 6
social impact