LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices

被引:33
作者
Dabra, Vivek [1 ]
Bala, Anju [1 ]
Kumari, Saru [2 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala 147004, Punjab, India
[2] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 04期
关键词
Protocols; Mobile handsets; Public key; Lattices; Servers; Anonymity; authentication; lattice-based cryptography; mobile device; postquantum cryptography; reconciliation-based key exchange;
D O I
10.1109/JSYST.2020.3023808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent advancement in quantum computers generates the threat alarm of breaking the security of key exchange protocols, which is based on discrete logarithmic or prime factorization problem in polynomial time. Hence, motivated to develop the key exchange protocol that is secure in the postquantum era, Feng et al. proposed an anonymous authenticated key exchange protocol for mobile devices in a postquantum world. Although the protocol is simple, elegant, and efficient for mobile devices, but it is vulnerable to signal leakage attack, spoofing attack, manipulation-based attacks, and user anonymity violation attack. Therefore, to overcome the above weaknesses, lattice-based anonymous password authenticated key exchange protocol has been proposed for mobile devices. Further, our protocol supports the key reuse, perfect forward secrecy, and anonymity features. Our formal security proof and implementation results show that the proposed protocol is suitable to be used for real-time security of mobile networks.
引用
收藏
页码:5067 / 5077
页数:11
相关论文
共 22 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]   On the concrete hardness of Learning with Errors [J].
Albrecht, Martin R. ;
Player, Rachel ;
Scott, Sam .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (03) :169-203
[3]  
Alkim E, 2017, NEWHOPE
[4]  
Alkim E., 2016, IACR CRYPTOLOGY EPRI, P1157
[5]  
Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
[6]   Random Oracles in a Quantum World [J].
Boneh, Dan ;
Dagdelen, Ozgur ;
Fischlin, Marc ;
Lehmann, Anja ;
Schaffner, Christian ;
Zhandry, Mark .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 :41-+
[7]   Post-quantum key exchange for the TLS protocol from the ring learning with errors problem [J].
Bos, Joppe W. ;
Costello, Craig ;
Naehrig, Michael ;
Stebila, Douglas .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :553-570
[8]  
Chen L., 2016, REP POSTQUANTUM CRYP
[9]  
Ding J, 2018, IACR CRYPTOL EPRINT, V2018, P81
[10]  
Ding JT, 2017, IEEE ICC