LWE-based key-exchange protocols lie at the heart of post-quantum public-key cryptography. However, all existing protocols either lack the non-interactive nature of Diffie–Hellman key exchange or polynomialLWE-modulus, resulting in unwanted efficiency overhead. We study the possibility of designing non-interactive LWE-based protocols with polynomialLWE-modulus. To this end, we identify and formalize simple non-interactive and polynomial LWE-modulus variants of the existing protocols, where Alice and Bob simultaneously exchange one or more (ring) LWE samples with polynomial LWE-modulus and then run individual key reconciliation functions to obtain the shared key. We point out central barriers and show that such non-interactive key-exchange p...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
A “Post-Quantum Key Exchange ” is needed since the availability of quantum computers that allegedly ...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
In [21], Peikert presents an efficient and provably secure set of lower level primitives for practic...
textabstractLattice-based cryptography offers some of the most attractive primitives believed to be ...
The threat of large-scale quantum computers motivates cryptographers to base cryptosystems on proble...
In 2014, Peikert described the first practical lattice-based key exchange that is provably secure an...
International audienceThe "learning with errors" (LWE) problem is to distinguish random linear equat...
© International Association for Cryptologic Research 2016. In CRYPTO 2015, Elias, Lauter, Ozman and ...
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum c...
Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman...
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not ...
Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptog...
© Springer International Publishing AG 2016. The persistent progress of quantum computing with algor...
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that it...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
A “Post-Quantum Key Exchange ” is needed since the availability of quantum computers that allegedly ...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
In [21], Peikert presents an efficient and provably secure set of lower level primitives for practic...
textabstractLattice-based cryptography offers some of the most attractive primitives believed to be ...
The threat of large-scale quantum computers motivates cryptographers to base cryptosystems on proble...
In 2014, Peikert described the first practical lattice-based key exchange that is provably secure an...
International audienceThe "learning with errors" (LWE) problem is to distinguish random linear equat...
© International Association for Cryptologic Research 2016. In CRYPTO 2015, Elias, Lauter, Ozman and ...
Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum c...
Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman...
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not ...
Ever since the appearance of quantum computers, prime factoring and discrete logarithm based cryptog...
© Springer International Publishing AG 2016. The persistent progress of quantum computing with algor...
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that it...
Digital signatures and encryption schemes constitute arguably an integral part of cryptographic sche...
A “Post-Quantum Key Exchange ” is needed since the availability of quantum computers that allegedly ...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...