You are looking at a specific version 20160131:085759 of this paper. See the latest version.

Paper 2016/085

Cryptanalysis of ring-LWE based key exchange with key share reuse

Scott Fluhrer

Abstract

This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates that, if these key exchange protocols are used, then it will be necessary for a fresh key share be generated for each exchange, and that these key exchange protocols cannot be used as a drop in replacement for designs which use Diffie-Hellman static key shares.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
lattice techniquesLWEring LWE
Contact author(s)
sfluhrer @ cisco com
History
2016-01-31: received
Short URL
https://ia.cr/2016/085
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.