Authentication protocol using trapdoored matrices
Author(s)
Sotiraki, Aikaterini
DownloadFull printable version (2.081Mb)
Other Contributors
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.
Advisor
Ronald L. Rivest.
Terms of use
Metadata
Show full item recordAbstract
In this thesis, we propose a new type of public-key authentication protocol, which is based on timing gaps. The honest user's secret key allows him to perform a task faster than any adversary. In our construction, the public key is a n x n matrix and the secret key is a trapdoor of this matrix. The task which an honest user has to perform in order to authenticate himself is a matrix-vector multiplication, where the vector is supplied by the verifier. We provide specific constructions of the trapdoor and analyze them both theoretically and practically.
Description
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016. Cataloged from PDF version of thesis. Includes bibliographical references (pages 51-52).
Date issued
2016Department
Massachusetts Institute of Technology. Department of Electrical Engineering and Computer SciencePublisher
Massachusetts Institute of Technology
Keywords
Electrical Engineering and Computer Science.