{"_id":"1187","year":"2017","quality_controlled":"1","doi":"10.1007/s00145-016-9247-3","author":[{"first_name":"Eike","last_name":"Kiltz","full_name":"Kiltz, Eike"},{"orcid":"0000-0002-9139-1654","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","first_name":"Krzysztof Z","full_name":"Pietrzak, Krzysztof Z"},{"full_name":"Venturi, Daniele","first_name":"Daniele","last_name":"Venturi"},{"full_name":"Cash, David","first_name":"David","last_name":"Cash"},{"full_name":"Jain, Abhishek","first_name":"Abhishek","last_name":"Jain"}],"external_id":{"isi":["000410788600007"]},"has_accepted_license":"1","date_updated":"2023-09-20T11:20:58Z","user_id":"c635000d-4b10-11ee-a964-aac5a93f6ac1","related_material":{"record":[{"status":"public","relation":"earlier_version","id":"3238"}]},"status":"public","isi":1,"publication_status":"published","scopus_import":"1","ddc":["000"],"volume":30,"citation":{"mla":"Kiltz, Eike, et al. “Efficient Authentication from Hard Learning Problems.” Journal of Cryptology, vol. 30, no. 4, Springer, 2017, pp. 1238–75, doi:10.1007/s00145-016-9247-3.","ista":"Kiltz E, Pietrzak KZ, Venturi D, Cash D, Jain A. 2017. Efficient authentication from hard learning problems. Journal of Cryptology. 30(4), 1238–1275.","short":"E. Kiltz, K.Z. Pietrzak, D. Venturi, D. Cash, A. Jain, Journal of Cryptology 30 (2017) 1238–1275.","ieee":"E. Kiltz, K. Z. Pietrzak, D. Venturi, D. Cash, and A. Jain, “Efficient authentication from hard learning problems,” Journal of Cryptology, vol. 30, no. 4. Springer, pp. 1238–1275, 2017.","ama":"Kiltz E, Pietrzak KZ, Venturi D, Cash D, Jain A. Efficient authentication from hard learning problems. Journal of Cryptology. 2017;30(4):1238-1275. doi:10.1007/s00145-016-9247-3","chicago":"Kiltz, Eike, Krzysztof Z Pietrzak, Daniele Venturi, David Cash, and Abhishek Jain. “Efficient Authentication from Hard Learning Problems.” Journal of Cryptology. Springer, 2017. https://doi.org/10.1007/s00145-016-9247-3.","apa":"Kiltz, E., Pietrzak, K. Z., Venturi, D., Cash, D., & Jain, A. (2017). Efficient authentication from hard learning problems. Journal of Cryptology. Springer. https://doi.org/10.1007/s00145-016-9247-3"},"month":"10","publication":"Journal of Cryptology","issue":"4","page":"1238 - 1275","day":"01","project":[{"name":"Teaching Old Crypto New Tricks","_id":"258AA5B2-B435-11E9-9278-68D0E5697425","grant_number":"682815","call_identifier":"H2020"},{"name":"Provable Security for Physical Cryptography","_id":"258C570E-B435-11E9-9278-68D0E5697425","grant_number":"259668","call_identifier":"FP7"}],"intvolume":" 30","file_date_updated":"2020-07-14T12:44:37Z","language":[{"iso":"eng"}],"date_created":"2018-12-11T11:50:37Z","title":"Efficient authentication from hard learning problems","article_processing_charge":"No","department":[{"_id":"KrPi"}],"ec_funded":1,"abstract":[{"lang":"eng","text":"We construct efficient authentication protocols and message authentication codes (MACs) whose security can be reduced to the learning parity with noise (LPN) problem. Despite a large body of work—starting with the (Formula presented.) protocol of Hopper and Blum in 2001—until now it was not even known how to construct an efficient authentication protocol from LPN which is secure against man-in-the-middle attacks. A MAC implies such a (two-round) protocol."}],"oa":1,"date_published":"2017-10-01T00:00:00Z","oa_version":"Submitted Version","publist_id":"6166","type":"journal_article","file":[{"file_id":"7843","access_level":"open_access","date_created":"2020-05-14T16:30:17Z","file_size":516959,"date_updated":"2020-07-14T12:44:37Z","creator":"dernst","checksum":"c647520d115b772a1682fc06fa273eb1","relation":"main_file","file_name":"2017_JournalCrypto_Kiltz.pdf","content_type":"application/pdf"}],"publisher":"Springer","article_type":"original"}