搜索结果: 1-12 共查到“军队指挥学 RLWE”相关记录12条 . 查询时间(0.046 秒)
Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption
Authenticated Key Exchange RLWE key reuse
2019/6/10
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in practice. Its authenticated version, Authenticated Key Exchange (AKE), avoids man-in-the-middle-based attacks by pro...
Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption
cryptographic protocols oblivious transfer
2018/12/3
We use an RLWE-based key exchange scheme to construct a simple and efficient post-quantum oblivious transfer based on the Ring Learning with Errors assumption. We prove that our protocol is secure in ...
How to validate the secret of a Ring Learning with Errors (RLWE) key
RLWE key exchange post-quantum
2018/1/24
We use the signal function from RLWE key exchange to derive an efficient zero knowledge authentication protocol to validate an RLWE key p=as+ep=as+e with secret ss and error ee in the Random Oracle Mo...
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS
Authenticated Key Exchange Implementation Post-quantum
2017/12/19
Two post-quantum password-based authenticated key exchange (PAKE) protocols were proposed at CT-RSA 2017. Following this work, we give much more efficient and portable C++ implementation of these two ...
Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features. Com...
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
RLWE key exchange post quantum
2017/12/13
Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key ...
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol
RLWE Post Quantum Key Exchange
2017/12/11
Error reconciliation is an important technique for Learning With Error (LWE) and Ring-LWE (RLWE)-based constructions. In this paper, we present a comparison analysis on two error reconciliation-based ...
Leakage of Signal function with reused keys in RLWE key exchange
RLWE key exchange post quantum
2017/1/3
In this paper, we show that the signal function used in RLWE key exchange could leak information to find the secret ss of a reused public key p=as+2ep=as+2e. This work is motivated by an attack propos...
Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15
small field attack authenticated key exchange ring-LWE
2016/12/9
Authenticated key-exchange (AKE) plays a fundamental role in modern cryptography. Up to now, the HMQV protocol family is among the most efficient provably secure AKE protocols, which has been widely s...
Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld
Diffie-Hellman Key Exchange Authenticated
2016/6/3
Authenticated Key Exchange (AKE) is a cryptographic scheme with the aim to
establish a high-entropy and secret session key over a insecure communications network.
Password-Authenticated Key Exchange...
We explore further the hardness of the RLWE problem for various number rings, construct a new family of vulnerable Galois number fields, give improved attacks for certain rings satisfying some additio...
Attacks on Search RLWE
RLWE Attacks Cryptanalysis
2015/12/22
We describe a new attack on the Search Ring Learning-With-Errors (RLWE) problem based
on the chi-square statistical test, and give examples of RLWE instances in Galois number fields which
are vulner...