You are looking at a specific version 20141021:031013 of this paper. See the latest version.

Paper 2014/426

Efficient Authentication from PRG, Revisited

Ivan Damgård and Sunoo Park

Abstract

We propose a new approach to the construction of secret-key authentication protocols from pseudorandom generators (PRG). Our authentication protocols require only two messages, have perfect completeness, and achieve the strongest meaningful security notion (man-in-the-middle security). Finally, if the PRG can be computed in poly-logarithmic depth, the authentication protocol also requires only poly-logarithmic depth computation. To the best of our knowledge, this construction is the first to have all these properties simultaneously. We achieve this at the cost of having the prover (but not the verifier) keep a small amount of state. Very efficient PRGs that can be computed in small depth can be constructed, for instance, based on the Learning Parity with Noise (LPN) problem, and our protocol is in several respects an attractive alternative even to protocols that are derived directly from LPN. A variant of our construction is secure even if the adversary is able to reset the prover.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Authenticationpseudorandom generatorspseudorandom functionsLPN
Contact author(s)
sunoo @ csail mit edu
History
2016-02-10: last of 5 revisions
2014-06-06: received
See all versions
Short URL
https://ia.cr/2014/426
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.