Information Security Seminar  RSS

Sessions

11/07/2017, 16:30 — 17:30 — Room P3.10, Mathematics Building
, University of Cincinnati

RLWE-based authentication and key reuse for RLWE-based key exchanges

In this talk, we will present new authentication schemes, where a prover tries to proves that he or she knows a secret solution to the RLWE problem without revealing any information on the solution. For an interactive scheme, we can prove the zero-knowledge property. We will also present a non-interactive scheme, and show how it can be used to build RLWE based key exchanges, where key reuse is also secure.