当前位置: 首页 / English / Academics / 正文

Post-Quantum Key Exchange from the LWE

作者:   时间:2021-04-13   点击数:

Lecturer:Jintai Ding

Summary:

In this lecture, we present practical and provably secure (authenticated) key exchange protocol and password authenticated key exchange protocol, which are based on the learning with errors problems. These protocols are conceptually simple and have strong provable security properties. This type of new constructions were started in 2011-2012. These protocols are shown indeed practical. We will explain that all the existing LWE based key exchanges are variants of this fundamental design. In addition, we will explain some issues with key reuse and how to use the signal function invented for KE for authentication schemes.

Introduction to the Lecturer:

Jintai Ding is a professor at the Yau Mathematgical Scieneces Center at Tsinghua University and the director of Ding Lab in Privacy Protection and Bockchain Security at Beijing Institute of Mathematical Sciences and Applications. Before that he was a Charles Phelps Taft professor at the Department of Mathematical Sciences at the University of Cincinnati. He received B.A. from Xian Jiao tong University in 1988, M.A. from the University of Science and technology of China in 1990 and Ph.D from Yale in 1995. He was a lecturer at the Research Institute of Mathematical Sciences of Kyoto University from 1995 to 1998. In 2006-2007, he was a visiting professor and Alexander Von Humboldt Fellow at TU Darmstadt. He received the Zhong Jia Qing Prize from the Chinese Mathematical Society in 1990 for his Master Thesis. His research was originally in quantum affine algebras and its representation theory, where he was credited for the invention of the Ding-Iohara-Miki algebra. His current interest is in post-quantum cryptography, in particular, multivariate cryptography, latticed-based cryptography and quantum-proof blockchain. He was a co-chair of the 2nd, 10th and 11th international conference on post-quantum cryptography. He and his colleagues developed the Rainbow signature, the Simple Matrix encryption and the LWE-based key exchange schemes. Rainbow is a third round candidate for the NIST post-quantum standardization process. He and his colleagues completely broke a NIST second round post-quantum signature candidate LUOV and a third nround candidate GeMSS (HFEv-).

Invited by:

Wang Mingqiang , Professor from School of Mathematics

Time:

9:00-10:00, April 14 (Wednesday)

Venue:

Academic Hall #808, Block B, Zhixin Building, Central Campus

Hosted by the School of Mathematics, Shandong University

地址:中国山东省济南市山大南路27号   邮编:250100  

电话:0531-88364652  院长信箱:sxyuanzhang@sdu.edu.cn

Copyright@山东大学数学学院

微信公众号