Abstract. Recently, Döttling et al. (ASIACRYPT 2012) proposed the first chosen-ciphertext (IND-CCA) secure public-key encryption scheme from the learning parity with noise (LPN) assumption. In this work we give an alternative scheme which is conceptually simpler and more efficient. At the core of our construction is a trapdoor technique originally proposed for lattices by Micciancio and Peikert (EUROCRYPT 2012), which we adapt to the LPN setting. The main technical tool is a new double-trapdoor mechanism, together with a trapdoor switching lemma based on a computational variant of the leftover hash lemma.
Abstract. We show how to construct, from any weak pseudorandom function, a 3-round symmetric-key authentication protocol that is secure against man-in-the-middle attacks. The construction is very efficient, requiring both the secret key and communication size to be only 3n bits long and involving only one call to the weak-PRF. Our techniques also extend to certain classes of randomized weak-PRFs, chiefly among which are those based on the classical LPN problem and its more efficient variants such as Toeplitz-LPN and Ring-LPN. Building an efficient manin-the-middle secure authentication scheme from any weak-PRF resolves
A large proportion of today's modern implantable medical devices (IMDs) comprises a wireless interface that enables the IMD to connect to another implanted device or a base station situated outside the body. Due to the various benefits, future IMD generations will certainly increase this number even more, making wireless connectivity for IMDs a matter of course. Since the data originating from biomedical applications usually contain sensitive information, security and privacy are major issues in IMD communications. The key challenge in providing adequate security for IMDs results from the severe size, power, and memory constraints that are inherent to most of the devices. In this paper, we discuss security and privacy design goals specific to resource-constrained IMDs. We then present a block cipher based security protocol featuring two modes: a stream mode aiming at minimizing the radio duty cycle while maintaining basic security and a session mode providing strong security for highly sensitive information and a role-based user authorization scheme. The protocol is presented using the Artificial Accommodation System (AAS) as an example. This novel micro-mechatronic implant is characterized by a high communication need and severe resource constraints.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.