Password authentication key exchange based on key consensus for IoT security

被引:2
作者
Zhao, Zongqu [1 ]
Ma, Shaoti [1 ]
Qin, Panke [1 ]
机构
[1] Henan Polytech Univ, Sch Comp Sci & Technol, 2001 Century Ave, Jiaozuo 454000, Henan, Peoples R China
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2023年 / 26卷 / 01期
基金
中国国家自然科学基金;
关键词
Key consensus; Password authentication key exchange; Approximate smooth projection hash; Internet of Things;
D O I
10.1007/s10586-022-03665-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limitation of the computing power and storage capacity of the device, the authentication key exchange protocol of the Internet of Things has higher requirements on the computation efficiency and communication efficiency. This paper proposes a lattice-based password authentication key exchange protocol based on key consensus, which can greatly reduce the time of key exchange. The proposed protocol uses the approximate smooth projection hash function and key consensus to design an asymmetric key agreement structure, which enables the device to realize key exchange while storing less authentication information. Compared with the existing password authentication key exchange protocols, the proposed protocol reduces the number of communications and the computation of the device during the protocol operation. In the paper, the computational cost of the prover is reduced to O(mn), and the amount of calculation on the device is cut in half. Finally, a longer session key can be generated by using this scheme. In addition, the security of the proposed protocol is based on the LWE difficulty problem, it can theoretically resist the attacks of the existing quantum algorithms.
引用
收藏
页码:837 / 846
页数:10
相关论文
共 27 条
  • [1] Security of the J-PAKE Password-Authenticated Key Exchange Protocol
    Abdalla, Michel
    Benhamouda, Fabrice
    MacKenzie, Philip
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 571 - 587
  • [2] Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
  • [3] BELLOVIN SM, 1992, 1992 IEEE COMPUTER SOCIETY SYMPOSIUM ON RESEARCH IN SECURITY AND PRIVACY : PROCEEDINGS, P72
  • [4] Cramer R, 2002, LECT NOTES COMPUT SC, V2332, P45
  • [5] A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks
    Farash, Mohammad Sabzinejad
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (17) : 4897 - 4913
  • [6] A framework for password-based authenticated key exchange
    Gennaro, Rosario
    Lindell, Yehuda
    [J]. ACM Transactions on Information and System Security, 2006, 9 (02) : 181 - 234
  • [7] Gorbenko Y, 2016, 2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), P51, DOI 10.1109/INFOCOMMST.2016.7905333
  • [8] A New Framework for Efficient Password-Based Authenticated Key Exchange
    Groce, Adam
    Katz, Jonathan
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 516 - 525
  • [9] cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications
    Han, KyungHyun
    Lee, Wai-Kong
    Hwang, Seong Oun
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (01): : 433 - 450
  • [10] Hu Xue-Xian, 2011, Journal of Software, V22, P2820, DOI 10.3724/SP.J.1001.2011.03910