Efficient Post-Quantum TLS Handshakes using Identity-Based Key Exchange from Lattices

被引:2
|
作者
Banerjee, Utsav [1 ]
Chandrakasan, Anantha P. [1 ]
机构
[1] MIT, Dept EECS, Cambridge, MA 02139 USA
关键词
D O I
10.1109/icc40277.2020.9148829
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Identity-Based Encryption (IBE) is considered an alternative to traditional certificate-based public key cryptography to reduce communication overheads in wireless sensor networks. In this work, we build on the well-known latticebased DLP-IBE scheme to construct an ID-based certificateless authenticated key exchange for post-quantum Transport Layer Security (TLS) handshakes. We also propose concrete parameters for the underlying lattice computations and provide detailed implementation results. Finally, we compare the combined computation and communication cost of our ID-based certificate-less handshake with the traditional certificate-based handshake, both using lattice-based algorithms at similar postquantum security levels, and show that our ID-based handshake is 3.7x more energy-efficient, thus highlighting the advantage of ID-based key exchange for post-quantum TLS.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications
    Dharminder, Dharminder
    Das, Ashok Kumar
    Saha, Sourav
    Bera, Basudeb
    Vasilakos, Athanasios V.
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [22] Post-quantum secure identity-based signature achieving forward secrecy
    Shaw, Surbhi
    Dutta, Ratna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [23] Post-quantum key exchange Protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Dammika
    Anshel, Michael
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [24] Compact Post-quantum Bounded-Collusion Identity-Based Encryption
    Sato, Shingo
    Shikata, Junji
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I, 2025, 14905 : 101 - 122
  • [25] Efficient Key Exchange Using Identity-Based Encryption in Multipath TCP Environment
    Almuflih, Ali Saeed
    Popat, Khushi
    Kapdia, Viral V.
    Qureshi, Mohamed Rafik Noor Mohamed
    Almakayeel, Naif
    Al Mamlook, Rabia Emhamed
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [26] Efficient hierarchical identity-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (01) : 1 - 10
  • [27] Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices
    Frymann, Nick
    Gardham, Daniel
    Manulis, Mark
    2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, 2023, : 928 - 941
  • [28] Efficient identity-based authenticated multiple key exchange protocol
    Chen, Yitao
    Han, Weiwei
    ACTA SCIENTIARUM-TECHNOLOGY, 2013, 35 (04) : 629 - 636
  • [29] Efficient identity-based authenticated multiple key exchange protocol
    Tan, Zuowen
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 191 - 198
  • [30] Post-Quantum Universal Composable OT Based on Key Exchange
    Hangchao, Ding
    Jiang, Han
    Xu, Qiuliang
    IEEE ACCESS, 2020, 8 : 148445 - 148459