Back to Results
First PageMeta Content
Electronic commerce / Learning with errors / Machine learning / XTR / Normal distribution / Diffie–Hellman key exchange / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Finite fields


A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem Jintai Ding, Xiang Xie, Xiaodong Lin University of Cincinnati Chinese Academy of Sciences Rutgers University
Add to Reading List

Document Date: 2014-07-29 14:01:16


Open Document

File Size: 359,22 KB

Share Result on Facebook

City

Lattice / /

Company

Errors Problem We / T T T 0 sA / matrix SA / /

Currency

pence / USD / AED / /

Event

FDA Phase / /

Facility

Xiaodong Lin University of Cincinnati Chinese Academy / /

IndustryTerm

celebrated key exchange protocol / secure key exchange protocol / interactive multiparty key exchange protocol / randomized algorithm / diffie-hellman protocol / secure key exchange protocols / signal generation algorithm / hint algorithm / countless applications / encryption-type key exchange protocol / party protocol / deterministic algorithm / key exchange protocol / identity-based encryption systems / multiplicative / important cryptographic protocols / /

NaturalFeature

Hence sTA MT / MT sB / sTA MT / /

Organization

University of Cincinnati Chinese Academy / Rutgers University / /

Person

Xiang Xie / /

Position

extractor / /

Product

Multiple Bits / /

Technology

encryption / 1.1 DH Protocol vs Encryption / signal generation algorithm / encryption-type key exchange protocol / cryptography / celebrated key exchange protocol / randomized algorithm / two party protocol / public key / important cryptographic protocols / interactive multiparty key exchange protocol / key exchange protocol / 1 Introduction Key exchange protocol / public-key encryption / provably secure key exchange protocols / LWE-type encryption / alternative algorithm / key exchange protocols / RSA encryption / LWE Key exchange protocols / Diffien-Hellman key exchange protocol / deterministic algorithm / identity-based encryption / Diffie-Hellman key exchange protocol / mathematical principles The DH key exchange protocol / hint algorithm / private key / 1.2 Lattice-Based Key Exchange Protocol / RSA algorithm / SSL / secure key exchange protocol / Techniques The DH key exchange protocol / Diffie-Hellman protocol / public key encryption / 2q Key Exchange Protocol / /

SocialTag