Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.4.3 PUF-Based Key Distribution for LWR Lattice Cryptography
There are some similarities between LWE and LWR implementations. In the case of LWR, the seed k from the PUF is only used to generate one vector, 𝑠1(i) while a constant vector ℎ(i) can be generated independently. The public vector 𝑡(i) is computed in a similar way:
𝑡(i)← 𝐴(i)⋅ 𝑠1(i) + ℎ(i)