Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices - MaRDI portal

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices

From MaRDI portal
Publication:3650718

DOI10.1007/978-3-642-10366-7_37zbMath1267.94122OpenAlexW124221785MaRDI QIDQ3650718

Vinod Vaikuntanathan, Jonathan N. Katz

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_37




Related Items (22)

Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key ConsensusPAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard ModelApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsChosen ciphertext secure keyed-homomorphic public-key cryptosystemsRound-optimal password-based authenticated key exchangeAugmented Learning with Errors: The Untapped Potential of the Error TermA universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure)Structure-Preserving Smooth Projective HashingPost-quantum key exchange for the Internet and the open quantum safe projectLattice-based authenticated key exchange with tight securityAlmost tight multi-user security under adaptive corruptions from LWE in the standard modelProvably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum WorldHow not to create an isogeny-based PAKEExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationGroup Key Establishment in a Quantum-Future ScenarioA simple provably secure AKE from the LWE problemGeneric Construction of UC-Secure Oblivious TransferMulti-theorem preprocessing NIZKs from latticesThe Geometry of Lattice CryptographyNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsCovert authentication from latticesA gapless code-based hash proof system based on RQC and its applications




This page was built for publication: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices