Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
From MaRDI portal
Publication:3650718
DOI10.1007/978-3-642-10366-7_37zbMath1267.94122OpenAlexW124221785MaRDI QIDQ3650718
Vinod Vaikuntanathan, Jonathan N. Katz
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_37
Related Items (22)
Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key Consensus ⋮ PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model ⋮ Approximate-Deterministic Public Key Encryption from Hard Learning Problems ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Round-optimal password-based authenticated key exchange ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ A universally composable PAKE with zero communication cost. (And why it shouldn't be considered UC-secure) ⋮ Structure-Preserving Smooth Projective Hashing ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ Lattice-based authenticated key exchange with tight security ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model ⋮ Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World ⋮ How not to create an isogeny-based PAKE ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Group Key Establishment in a Quantum-Future Scenario ⋮ A simple provably secure AKE from the LWE problem ⋮ Generic Construction of UC-Secure Oblivious Transfer ⋮ Multi-theorem preprocessing NIZKs from lattices ⋮ The Geometry of Lattice Cryptography ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Covert authentication from lattices ⋮ A gapless code-based hash proof system based on RQC and its applications
This page was built for publication: Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices