We first propose an authenticated key exchange (AKE) from the LWE problem. The AKE is simple since it does not involve any other cryptographic primitives to achieve authentication and depends on solely the LWE problem in the worst-case (e.g., SVP and SIVP). We give its security under the BR model, which captures wPFS and might be appealing in specific applications.
from #AlexandrosSfakianakis via Alexandros G.Sfakianakis on Inoreader http://ift.tt/2oTti7B
via IFTTT
Εγγραφή σε:
Σχόλια ανάρτησης (Atom)
Δημοφιλείς αναρτήσεις
-
Abstract Over the past decades, an increasing need in renewable resources has progressively appeared. This trend concerns not only fossil f...
-
Chromium(VI) reduction in Streptomyces sp. M7 mediated by a novel Old Yellow Enzyme Abstract Old Yellow Enzymes play key roles in several ce...
-
Coenzyme Q (CoQ) is a key component of the mitochondrial respiratory chain, but it also has several other functions in the cellular metaboli...
-
The main idea behind this work was demonstrated in a form of a new thermoelectrochromic sensor on a flexible substrate using graphene as an ...
-
Publication date: Available online 10 May 2017 Source: Journal of Dairy Science Author(s): R.E. Vibart, M. Tavendale, D. Otter, B.H. Schw...
-
The versatility of the thoracodorsal artery based composite flaps with vascularized rib and a systematic... The versatility of the thoracodo...
-
Abdominal actinomycosis is a rare disease caused by different anaerobic Actinomyces species. We report the case of a 55-year-old woman who ...
-
MiR-153 regulates cardiomyocyte apoptosis by targeting Nrf2/HO-1 signaling Abstract MicroRNAs (miRNAs) play various roles in the regulation ...
-
Related Articles Video Game Rehabilitation for Outpatient Stroke (VIGoROUS): protocol for a multi-center comparative effectiveness tr...
Δεν υπάρχουν σχόλια:
Δημοσίευση σχολίου