A Robust Lattice-Based Post-Quantum Three-Party Key Exchange Scheme for Mobile Devices

被引:0
作者
Singh, Akanksha [1 ]
Chandra, Harish [1 ]
Rana, Saurabh [2 ]
机构
[1] MMM Univ Technol, Dept Math & Sci Comp, Gorakhpur, India
[2] Bennett Univ, Dept Math SCSET, Greater Noida, India
关键词
authentication; key agreement; lattice-based cryptography; RLWE; AUTHENTICATION SCHEME; PROTOCOL; SECURITY; SINGLE;
D O I
10.1002/cpe.70036
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we introduce a lattice-based authenticated three-party key agreement scheme for mobile devices with the aim of achieving both post-quantum security and efficiency. Our scheme is inspired by the authenticated key exchange protocol developed. We revisit the recently suggested system, which is a communication-efficient three-party password-authenticated key exchange, in which we found that the scheme is not fully correct and also demonstrate that the scheme is not safe from user's anonymity and impersonation assaults. We provide an enhanced scheme that is both effective and resistant to the mentioned assault. We also demonstrate its security in a ROM (Random Oracle Model). A comparison analysis that includes performance, security evaluations, energy consumption, and packet loss rate is also provided, proving the suitability of the suggested design.
引用
收藏
页数:17
相关论文
共 41 条
[1]   Dual-Signature Blockchain-Based Key Sharing Protocol for Secure V2V Communications in Multi-Domain IoV Environments [J].
Abbasinezhad-Mood, Dariush ;
Ghaemi, Hadi .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) :13407-13416
[2]   Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision [J].
Abbasinezhad-Mood, Dariush ;
Mazinani, Sayyed Majid ;
Nikooghadam, Morteza ;
Ostad-Sharif, Arezou .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1227-1238
[3]   NFLlib: NTT-Based Fast Lattice Library [J].
Aguilar-Melchor, Carlos ;
Barrier, Joris ;
Guelton, Serge ;
Guinet, Adrien ;
Killijian, Marc-Olivier ;
Lepoint, Tancrede .
TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 :341-356
[4]   MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication [J].
Basu, Swagatam ;
Seyhan, Kubra ;
Islam, S. K. Hafizul ;
Akleylek, Sedat .
IEEE SYSTEMS JOURNAL, 2023, 17 (04) :6093-6103
[5]  
Blanchet Bruno, 2018, ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial, P05
[6]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[7]   A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography [J].
Chaudhary, Dharminder ;
Kumar, Uddeshaya ;
Saleem, Kashif .
IEEE ACCESS, 2023, 11 :136947-136957
[8]  
Choi R., 2018, Proceedings of the 2018 Symposium on Cryptography and Information Security (SCIS 2018)
[9]   LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices [J].
Dabra, Vivek ;
Bala, Anju ;
Kumari, Saru .
IEEE SYSTEMS JOURNAL, 2021, 15 (04) :5067-5077
[10]   LWEDM: Learning with error based secure mobile digital rights management system [J].
Dharminder, Dharminder .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (02)