SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world

被引:1
作者
Dabra, Vivek [1 ]
Kumari, Saru [2 ]
Bala, Anju [3 ]
Yadav, Sonam [4 ]
机构
[1] Panipat Inst Engn & Technol, Dept Comp Sci & Engn, Panipat, India
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut, India
[3] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala, India
[4] SGT Univ, Dept Math, Gurugram, India
关键词
Post-quantum cryptography; Lattice based cryptography; Ring Learning With Error; Key exchange; Signal leakage attack; SECURE;
D O I
10.1016/j.jisa.2024.103826
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Three -party Password Authenticated Key Exchange (3PAKE) is a protocol where two parties generate the same session key with the help of a trusted server. With the evolution of quantum computers, there is a growing need to develop the 3PAKE protocols that can resist the quantum attacks. Hence, various 3PAKE protocols have been proposed based on the famous Ring Learning With Error (RLWE) problem. But we find out that all these protocols are vulnerable to signal leakage attacks if their public/private keys are reused. Also, the design of these protocols are pretty complex, thus making these protocols highly inefficient. Hence, to overcome the above issues, we have proposed Simple Lattice -based 3PAKE (SL3PAKE), which is simple in its design and resists signal leakage attack if its public/private keys are reused. The order and flow of messages in the proposed SL3PAKE protocol is quite natural without added complexity, thus makes it simple 3PAKE protocol. Finally, we present the comparative analysis based on communication overhead among the proposed SL3PAKE and other three -party protocols. From the analysis, it has been shown that the proposed SL3PAKE protocol has much less communication overhead/communication rounds than the other three -party protocols.
引用
收藏
页数:11
相关论文
共 39 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   On the concrete hardness of Learning with Errors [J].
Albrecht, Martin R. ;
Player, Rachel ;
Scott, Sam .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) :169-203
[3]  
Alkim E, 2017, NEWHOPE
[4]  
Alkim E., 2016, IACR CRYPTOLOGY EPRI
[5]  
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[6]  
[Anonymous], 2021, Experimenting with post-quantum cryptography
[7]  
[Anonymous], 2021, 20 Years of quantum computing growth
[8]   MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication [J].
Basu, Swagatam ;
Seyhan, Kubra ;
Islam, S. K. Hafizul ;
Akleylek, Sedat .
IEEE SYSTEMS JOURNAL, 2023, 17 (04) :6093-6103
[9]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[10]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084