Quantum secure two party authentication protocol for mobile devices

被引:0
|
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
来源
Peer-to-Peer Networking and Applications | 2023年 / 16卷
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [1] Quantum secure two party authentication protocol for mobile devices
    Moony, Bshisht
    Barnwal, Amit K.
    Singh, Mrityunjay
    Mishra, Dheerendra
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2548 - 2559
  • [2] Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices
    Chaudhary, Dharminder
    Kumar Dadsena, Pradeep
    Padmavathi, A.
    Mehedi Hassan, Mohammad
    Fahad Alkhamees, Bader
    Kumar, Uddeshaya
    IEEE ACCESS, 2024, 12 : 74572 - 74585
  • [3] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [4] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
  • [5] An efficient two-party authentication key exchange protocol for mobile environment
    Qi, Mingping
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [6] Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
    Hwang, Doo-Hee
    Shin, Jin-Myeong
    Choi, Yoon-Ho
    2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 694 - 696
  • [7] SPAM: Secure Protocol for Authentication in Mobile-Communications
    Das, ML
    Saxena, A
    ICMB 2005: International Conference on Mobile Business, 2005, : 23 - 27
  • [8] Cryptanalysis of A Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1063 - 1068
  • [9] Restoration Protocol: Lightweight and Secure Devices Authentication Based on PUF
    Ovilla-Martinez, Brisbane
    Bossuet, Lilian
    2017 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2017, : 43 - 48
  • [10] A secure authentication protocol for wearable devices environment using ECC
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (8-15) : 8 - 15