Jintai Ding | April 12, 2022 | Post-quantum cryptography & post-quantum key exchange

Title: Post-quantum cryptography and post-quantum key exchange based on the LWE and RLWE problems Speaker: Jintai Ding (Tsinghua University and Beijing Ins...

Mathematical Picture Language575 views01:14:29

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Bangladesh under the topic 's'.

About this video

Title: Post-quantum cryptography and post-quantum key exchange based on the LWE and RLWE problems Speaker: Jintai Ding (Tsinghua University and Beijing Institute of Mathematical Sciences and Applications) Abstract: Public key cryptosystems (PKC) are a critical part of the foundation of modern communication systems, in particular, the Internet. However Shor's algorithm shows that the existing PKC like Diffie-Hellmann key exchange, RSA and ECC can be broken by a quantum computer. To prepare for the coming age of quantum computing, we need to build new public key cryptosystems that could resist quantum computer attacks. In this lecture, we will give a brief introduction to post-quantum cryptography. Then we will present a practical and provably secure (authenticated) key exchange protocol based on the learning with errors problems, which is conceptually simple and has strong provable security properties. This new construction was established in 2011-2012. We will explain that all the existing LWE-based key exchanges are variants of this fundamental design. In addition, we will explain how to use the signal function invented for KE for authentication schemes. Then we will discuss key reuse attacks on those key exchanges.

Video Information

Views
575

Total views since publication

Likes
6

User likes and reactions

Duration
01:14:29

Video length

Published
Apr 12, 2022

Release date

Quality
hd

Video definition