PiLike: Post-Quantum Identity-Based Lightweight Authenticated Key Exchange Protocol for IIoT Environments

被引:9
作者
Gupta, Daya Sagar [1 ]
机构
[1] Indian Inst Technol Mandi, Kamand 175075, Himachal Prades, India
来源
IEEE SYSTEMS JOURNAL | 2024年 / 18卷 / 01期
关键词
Identity-based cryptography; Industrial Internet of Things (IIoT); key agreement; lattice cryptography; provable security; AGREEMENT PROTOCOL; EFFICIENT; SCHEME;
D O I
10.1109/JSYST.2023.3335217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As an imperative division of the Internet of Things (IoT), Industrial IoT (IIoT) has also attracted full attention. IIoT networks are equipped with various authenticated key exchange techniques under the cumbersome Diffie-Hellman (DH) problems and certificate management overheads. However, DH-type problems are vulnerable to quantum cryptanalysis. In this article, a novel identity-based authenticated key exchange protocol is designed using the concept of lattice cryptography, which enables the different security features in the IIoT in open wireless communication. Due to the lattice hard assumptions, the proposed protocol can withstand a quantum attack. Rigorous formal security analysis has been made, which shows the ability of the proposed protocol to resist existing as well as quantum attacks. Performance results demonstrate that the proposed protocol exhibits better communication, energy consumption, cryptographic key storage, and computation costs than other similar state of the arts.
引用
收藏
页码:15 / 23
页数:9
相关论文
共 38 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Ajtai M., 2007, PROC ELECT C COMPUT, V14, P1
[3]  
[Anonymous], 2018, 2018 4 INT C RECENT
[4]   PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks [J].
Bala, Suman ;
Sharma, Gaurav ;
Verma, Anil K. .
WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) :995-1012
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]   Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks [J].
Cui, Jie ;
Wang, Yali ;
Zhang, Jing ;
Xu, Yan ;
Zhong, Hong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) :8914-8924
[7]   Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks [J].
Dang, Lanjun ;
Xu, Jie ;
Cao, Xuefei ;
Li, Hui ;
Chen, Jie ;
Zhang, Yueyu ;
Fu, Xiaotong .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (04)
[8]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[9]  
Ducas L, 2018, IACR Transactions on Cryptographic Hardware and Embedded Systems, P238, DOI [10.46586/tches.v2018.i1.238-268, DOI 10.46586/TCHES.V2018.I1.238-268, DOI 10.13154/TCHES.V2018.I1.238-268]
[10]  
Gentry C, 2008, ACM S THEORY COMPUT, P197