Staff View
Two-Round Man-in-the-Middle Security from LPN

Descriptive

TypeOfResource
Text
TitleInfo
Title
Two-Round Man-in-the-Middle Security from LPN
Name (type = personal)
NamePart (type = family)
Cash
NamePart (type = given)
David
Affiliation
Computer Science (New Brunswick), Rutgers University
Role
RoleTerm (authority = marcrt); (type = text)
author
Name (type = personal)
NamePart (type = family)
Kiltz
NamePart (type = given)
Eike
Affiliation
Ruhr University Bochum
Role
RoleTerm (authority = marcrt); (type = text)
author
Name (type = personal)
NamePart (type = family)
Tessaro
NamePart (type = given)
Stefano
Affiliation
University of California Santa Barbara
Role
RoleTerm (authority = marcrt); (type = text)
author
Name (authority = RutgersOrg-Department); (type = corporate)
NamePart
Computer Science (New Brunswick)
Name (authority = RutgersOrg-School); (type = corporate)
NamePart
School of Arts and Sciences (SAS) (New Brunswick)
Genre (authority = RULIB-FS)
Conference Paper or Lecture
Genre (authority = NISO JAV)
Accepted Manuscript (AM)
Note (type = peerReview)
Peer reviewed
OriginInfo
Publisher
Springer
DateIssued (encoding = w3cdtf); (keyDate = yes); (qualifier = exact)
2016
Abstract (type = Abstract)
Secret-key authentication protocols have recently received a considerable amount of attention, and a long line of research has been devoted to devising efficient protocols with security based on the hard- ness of the learning-parity with noise (LPN) problem, with the goal of achieving low communication and round complexities, as well as highest possible security guarantees.

In this paper, we construct 2-round authentication protocols that are secure against sequential man-in-the-middle (MIM) attacks with tight reductions to LPN, Field-LPN, or other problems. The best prior pro- tocols had either loose reductions and required 3 rounds (Lyubashevsky and Masny, CRYPTO’13) or had a much larger key (Kiltz et al., EURO- CRYPT’11 and Dodis et al., EUROCRYPT’12). Our constructions follow from a new generic deterministic and round-preserving transformation enhancing actively-secure protocols of a special form to be sequentially MIM-secure while only adding a limited amount of key material and computation.
Language
LanguageTerm (authority = ISO 639-3:2007); (type = text)
English
PhysicalDescription
InternetMediaType
application/pdf
Extent
24 p.
Subject (authority = local)
Topic
Secret-key authentication
Subject (authority = local)
Topic
Man-in-the-Middle security
Subject (authority = local)
Topic
LPN
Subject (authority = local)
Topic
Field LPN.
Subject (authority = local)
Topic
Parity learning
Subject (authority = LCSH)
Topic
Computer security
Extension
DescriptiveEvent
Type
Citation
AssociatedObject
Name
Lecture Notes in Computer Science
Type
Journal
Relationship
Has part
Reference (type = url)
http://dx.doi.org/10.1007/978-3-662-49096-9_10
Detail
225-248
Identifier (type = volume and issue)
9562
DateTime (encoding = w3cdtf)
2016
Extension
DescriptiveEvent
Type
Conference
Label
Theory of Cryptography Conference
Place
Tel Aviv (Israel)
DateTime (encoding = w3cdtf)
2016-01
AssociatedEntity
Role
Sponsor
Name
International Association for Cryptologic Research
Detail
13th
Extension
DescriptiveEvent
Type
Grant award
AssociatedEntity
Role
Funder
Name
National Science Foundation
AssociatedEntity
Role
Originator
Name
David Cash
AssociatedObject
Type
Grant number
Name
CNS-1453132
Extension
DescriptiveEvent
Type
Grant award
AssociatedEntity
Role
Funder
Name
National Science Foundation
AssociatedEntity
Role
Originator
Name
Stefano Tessaro
AssociatedObject
Type
Grant number
Name
CNS-1423566
Extension
DescriptiveEvent
Type
Grant award
AssociatedEntity
Role
Funder
Name
National Science Foundation
AssociatedEntity
Role
Originator
Name
David Cash
AssociatedEntity
Role
Originator
Name
Stefano Tessaro
AssociatedObject
Type
Grant number
Name
CNS-1523467
Extension
DescriptiveEvent
Type
Grant award
AssociatedEntity
Role
Funder
Name
European Research Council
AssociatedEntity
Role
Originator
Name
Eike Kiltz
AssociatedObject
Type
Grant number
Name
Project ERCC (FP7/615074(
RelatedItem (type = host)
TitleInfo
Title
Cash, David
Identifier (type = local)
rucore30178500001
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
NjNbRU
Identifier (type = doi)
doi:10.7282/T3N018HD
Back to the top

Rights

RightsDeclaration (AUTHORITY = FS); (ID = rulibRdec0004); (TYPE = [FS] statement #1)
Copyright for scholarly resources published in RUcore is retained by the copyright holder. By virtue of its appearance in this open access medium, you are free to use this resource, with proper attribution, in educational and other non-commercial settings. Other uses, such as reproduction or republication, may require the permission of the copyright holder.
Copyright
Status
Copyright protected
Availability
Status
Open
Reason
Permission or license
RightsEvent
Type
Permission or license
AssociatedObject
Type
License
Name
Multiple author license v. 1
Detail
I hereby grant to Rutgers, The State University of New Jersey (Rutgers) the non-exclusive right to retain, reproduce, and distribute the deposited work (Work) in whole or in part, in and from its electronic format, without fee. This agreement does not represent a transfer of copyright to Rutgers.Rutgers may make and keep more than one copy of the Work for purposes of security, backup, preservation, and access and may migrate the Work to any medium or format for the purpose of preservation and access in the future. Rutgers will not make any alteration, other than as allowed by this agreement, to the Work.I represent and warrant to Rutgers that the Work is my original work. I also represent that the Work does not, to the best of my knowledge, infringe or violate any rights of others.I further represent and warrant that I have obtained all necessary rights to permit Rutgers to reproduce and distribute the Work and that any third-party owned content is clearly identified and acknowledged within the Work.By granting this license, I acknowledge that I have read and agreed to the terms of this agreement and all related RUcore and Rutgers policies.
RightsEvent
Type
Permission research
DateTime (encoding = w3cdtf); (qualifier = exact)
2015-12-02
Detail
http://www.cs.tau.ac.il/conferences/tcc2016/call_for_papers.html - TCC 2016 Submission instructions: “Online posting: Authors are strongly encouraged to post full versions of their submissions in a freely accessible online repository, such as the Cryptology ePrint archive. We encourage the authors to post such a version at the time of submission (in which case the authors should provide a link on the title page of their submission). At the minimum, we expect that authors of accepted papers will post a full version of their papers by the camera-ready deadline. Abstracts of accepted papers will be made public by the PC following notification.”
RightsHolder (type = personal)
Name
FamilyName
David
GivenName
Cash
Role
Copyright holder
RightsHolder (type = personal)
Name
FamilyName
Kiltz
GivenName
Eike
Role
Copyright holder
RightsHolder (type = personal)
Name
FamilyName
Tessaro
GivenName
Stefano
Role
Copyright holder
Back to the top

Technical

RULTechMD (ID = TECHNICAL1)
ContentModel
Document
Back to the top
Version 8.3.10
Rutgers University Libraries - Copyright ©2019