Paper 2014/426
Efficient Authentication from PRG, Revisited
Ivan Damgård and Sunoo Park
Abstract
We propose a new approach to the construction of secret-key authentication protocols from pseudorandom generators (PRG). Our authentication protocols require only two messages, have perfect completeness, and achieve the strongest meaningful security notion (man-in-the-middle security). Finally, if the PRG can be computed in poly-logarithmic depth, the authentication protocol also requires only poly-logarithmic depth computation. To the best of our knowledge, this construction is the first to have all these properties simultaneously. We achieve this at the cost of having the prover (but not the verifier) keep a small amount of state. Very efficient PRGs that can be computed in small depth can be constructed, for instance, based on the Learning Parity with Noise (LPN) problem, and our protocol is in several respects an attractive alternative even to protocols that are derived directly from LPN. A variant of our construction is secure even if the adversary is able to reset the prover.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- Authenticationpseudorandom generatorspseudorandom functionsLPN
- Contact author(s)
- sunoo @ csail mit edu
- History
- 2016-02-10: last of 5 revisions
- 2014-06-06: received
- See all versions
- Short URL
- https://ia.cr/2014/426
- License
-
CC BY