We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the HB protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol.
CITATION STYLE
Kiltz, E., Pietrzak, K., Venturi, D., Cash, D., & Jain, A. (2017). Efficient Authentication from Hard Learning Problems. Journal of Cryptology, 30(4), 1238–1275. https://doi.org/10.1007/s00145-016-9247-3
Mendeley helps you to discover research relevant for your work.