Two-Round Man-in-the-Middle Security from LPN

@inproceedings{Cash2015TwoRoundMS,
  title={Two-Round Man-in-the-Middle Security from LPN},
  author={David Cash and Eike Kiltz and Stefano Tessaro},
  booktitle={TCC},
  year={2015}
}
Secret-key authentication protocols have recently received a considerable amount of attention, and a long line of research has been devoted to devising efficient protocols with security based on the hardness of the learning-parity with noise (LPN) problem, with the goal of achieving low communication and round complexities, as well as highest possible security guarantees. In this paper, we construct 2-round authentication protocols that are secure against sequential man-in-the-middle (MIM… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…