Authenticated Key Exchange from Ideal Lattices

@inproceedings{Zhang2014AuthenticatedKE,
  title={Authenticated Key Exchange from Ideal Lattices},
  author={Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook},
  booktitle={IACR Cryptology ePrint Archive},
  year={2014}
}
In this paper, we present a practical and provably secure two-pass authenticated key exchange protocol over ideal lattices, which is conceptually simple and has similarities to the Diffie-Hellman based protocols such as HMQV (CRYPTO 2005) and OAKE (CCS 2013). Our method does not involve other cryptographic primitives—in particular, it does not use signatures—which simplifies the protocol and enables us to base the security directly on the hardness of the ring learning with errors problem. The… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 52 CITATIONS, ESTIMATED 98% COVERAGE

Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption

  • IACR Cryptology ePrint Archive
  • 2019
VIEW 7 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Efficient KEA-Style Lattice-Based Authenticated Key Exchange

  • IACR Cryptology ePrint Archive
  • 2018
VIEW 10 EXCERPTS
CITES METHODS, BACKGROUND & RESULTS
HIGHLY INFLUENCED

Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols

  • International Journal of Information Security
  • 2017
VIEW 8 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Post-quantum key exchange based on ring-LWE

VIEW 13 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Two-party authenticated key exchange protocol using lattice-based cryptography

  • IACR Cryptology ePrint Archive
  • 2016
VIEW 10 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Postquantum SSL/TLS for Embedded Systems

  • 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications
  • 2014
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack

  • IEEE Transactions on Computers
  • 2018
VIEW 3 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2014
2019

CITATION STATISTICS

  • 7 Highly Influenced Citations

  • Averaged 11 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 77 REFERENCES

Lattice Cryptography for the Internet

  • PQCrypto
  • 2014
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

  • IACR Cryptology ePrint Archive
  • 2001
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A simple provably secure key exchange scheme based on the learning with errors problem

J. Ding, X. Xie, X. Lin
  • Cryptology ePrint Archive, Report 2012/688
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Recommendation for the entropy sources used for random bit generation

E. Barker, A. Roginsky
  • (Draft NIST Special Publication
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL