An Efficient NTRU-Based Authentication Protocol in IoT Environment

被引:5
|
作者
Jeong, SeongHa [1 ]
Park, KiSung [2 ]
Park, YoHan [3 ]
Park, YoungHo [2 ]
机构
[1] SK Infosec, Mfg Serv Operat, 46,255 Pangyoro, Seongnamsi 13486, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, 80 Daehakro, Daegu 41566, South Korea
[3] Korea Nazarene Univ, Div IT Convergence, 48 Wolbongro, Cheonan 31172, South Korea
来源
INTELLIGENT COMPUTING, VOL 2 | 2019年 / 857卷
基金
新加坡国家研究基金会;
关键词
Quantum computing; Internet of Things (IoT); NTRU; Authentication; SCHEME;
D O I
10.1007/978-3-030-01177-2_91
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, to ensure privacy of user, the numerous elliptic curve cryptosystem based key distribution and authentication protocols for IoT environments have been proposed. However, most used public key based cryptosystems such as ECC and RSA cannot resist quantum computing attacks. In this paper, to overcome this security issue, we propose a NTRU based authentication and key distribution protocol. Our proposed protocol has also high performance compared with ECC based key distribution protocol. Therefore, the proposed protocol can be applied to practical field such as smarthome, smartgrid and healthcare efficiently.
引用
收藏
页码:1262 / 1268
页数:7
相关论文
共 50 条
  • [1] Cryptanalysis and Countermeasure of "An Efficient NTRU-based Authentication Protocol in IoT Environment"
    Park, YoHan
    Seok, Woojin
    Lee, Wonhyuk
    Ju, Hong Taek
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (12) : 25 - 31
  • [2] Security Analysis of a NTRU-based Mutual Authentication Scheme
    Tso, Raylin
    Jheng, Yi-Shio
    2016 18TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2016,
  • [3] Analysis and Improvement of a NTRU-Based Handover Authentication Scheme
    Wang, Qingxuan
    Cheng, Chi
    Zuo, Ling
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (10) : 1692 - 1695
  • [4] A Novel NTRU-Based Handover Authentication Scheme for Wireless Networks
    Chen, Rui
    Peng, Dezhong
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (03) : 586 - 589
  • [5] Private Proximity Testing on Steroids: An NTRU-based Protocol
    Patsakis, Constantinos
    Kotzanikolaou, Panayiotis
    Bouroche, Melanie
    SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 172 - 184
  • [6] A NTRU-Based Access Authentication Scheme for Satellite Terrestrial Integrated Network
    Wang, Shanshan
    Zhao, Guofeng
    Xu, Chuan
    Han, Zhenzhen
    Yu, Shui
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3629 - 3634
  • [7] MaTRU: A new NTRU-based cryptosystem
    Coglianese, M
    Goi, BM
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 232 - 243
  • [8] A Novel RFID Authentication Protocol Based on NTRU
    Shi, Zhicai
    Zhou, Jinzu
    Xia, Yongxiang
    Yu, Chaogang
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 16 - 20
  • [9] NTRU-Based Fully Homomorphic Signature
    Li, Ruonan
    Wang, Fuqun
    Zhang, Renjun
    Chen, Kefei
    Security and Communication Networks, 2022, 2022
  • [10] NTRU-Based Fully Homomorphic Signature
    Li, Ruonan
    Wang, Fuqun
    Zhang, Renjun
    Chen, Kefei
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022