Home > News & Events > Events Content
Speaker: Ding Jintai
Date: Apr.14, 2021
Time: 9:00-10:00a.m.
Location: 808 Lecture Hall, Block B, Zhixin Building, Central Campus
Abstract:
In this lecture, we present practical and provably secure (authenticated) key exchange protocol and password authenticated key exchange protocol, which are based on the learning with error problems. These protocols are conceptually simple and have strong provable security properties. This type of new constructions started in 2011-2012. These protocols are shown indeed practical. We will explain that all the existing LWE based key exchanges are variants of this fundamental design. In addition, we will explain some issues with key reuse and how to use the signal function invented for KE for authentication schemes.
Bio:
Ding Jintai is a professor at the Yau Mathematical Sciences Center at Tsinghua University and the director of Ding Lab in Privacy Protection and Block chain Security at Beijing Institute of Mathematical Sciences and Applications. Before that he was a Charles Phelps Taft professor at the Department of Mathematical Sciences at the University of Cincinnati. He received B.A. from Xian JiaoTong University in 1988, M.A. from the University of Science and Technology of China in 1990 and Ph.D from Yale in 1995. He was a lecturer at the Research Institute of Mathematical Sciences of Kyoto University from 1995 to 1998. In 2006-2007, he was a visiting professor and Alexander Von Humboldt Fellow at TU Darmstadt. He received the Zhong Jia Qing Prize from the Chinese Mathematical Society in 1990 for his Master Thesis. His research was originally in quantum affine algebras and its representation theory, where he was credited for the invention of the Ding-Iohara-Miki algebra. His current interest is in post-quantum cryptography, in particular, multivariate cryptography, latticed-based cryptography and quantum-proof block chain. He was a co-chair of the 2nd, 10th and 11th international conference on post-quantum cryptography. He and his colleagues developed the Rainbow signature, the Simple Matrix encryption and the LWE-based key exchange schemes. Rainbow is a third-round candidate for the NIST post-quantum standardization process. He and his colleagues completely broke a NIST second round post-quantum signature candidate LUOV and a third-round candidate GeMSS (HFEv-).
For more information, please visit:
https://www.view.sdu.edu.cn/info/1020/148924.htm