ABSTRACT
Lattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. This work introduces "Frodo" - a concrete instantiation of a key agreement mechanism based on hard problems in generic lattices.
Supplemental Material
- Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe. 2015. Postquantum key exchange-a new hope. IACR Cryptology ePrint Archive 2015 (2015), 1092.Google Scholar
- Joppe Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, and Douglas Stebila. 2016. Frodo: Take off the ring! practical, quantum-secure key exchange from LWE. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, USA, 1006–1018. Google ScholarDigital Library
- Joppe W Bos, Craig Costello, Michael Naehrig, and Douglas Stebila. 2015. Postquantum key exchange for the TLS protocol from the ring learning with errors problem. In Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 553–570. Google ScholarDigital Library
- Chris Peikert. 2014. Lattice cryptography for the internet. In International Workshop on Post-Quantum Cryptography. Springer International Publishing, Cham, 197–219.Google ScholarCross Ref
- Oded Regev. 2009. On lattices, learning with errors, random linear codes, and cryptography. Journal of the ACM (JACM) 56, 6 (2009), 34. Abstract Acknowledgments References Google ScholarDigital Library
Index Terms
- Practical post-quantum key agreement from generic lattices (invited talk)
Recommendations
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityLattice-based cryptography offers some of the most attractive primitives believed to be resistant to quantum computers. Following increasing interest from both companies and government agencies in building quantum computers, a number of works have ...
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
ASIA CCS '13: Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications securityThis paper discusses how to realize practical post-quantum authenticated key exchange (AKE) with strong security, i.e., CK+ security (Krawczyk, CRYPTO 2005). It is known that strongly secure post-quantum AKE protocols exist on a generic construction ...
Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR
Security and Cryptography for NetworksAbstractThe LWE problem has been widely used in many constructions for post-quantum cryptography due to its reduction from the worst-case of lattice hard problems and the lightweight operations for generating its instances. The PKE schemes based on the ...
Comments