You are looking at a specific version 20160131:085759 of this paper.
See the latest version.
Paper 2016/085
Cryptanalysis of ring-LWE based key exchange with key share reuse
Scott Fluhrer
Abstract
This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates that, if these key exchange protocols are used, then it will be necessary for a fresh key share be generated for each exchange, and that these key exchange protocols cannot be used as a drop in replacement for designs which use Diffie-Hellman static key shares.
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- lattice techniquesLWEring LWE
- Contact author(s)
- sfluhrer @ cisco com
- History
- 2016-01-31: received
- Short URL
- https://ia.cr/2016/085
- License
-
CC BY