Quantum secure two party authentication protocol for mobile devices

被引:0
|
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
来源
Peer-to-Peer Networking and Applications | 2023年 / 16卷
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [21] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    IEEE ACCESS, 2016, 4 : 4394 - 4407
  • [22] An Identity Based Secure and Fast Authentication Protocol in Wireless Mobile Networks
    Wang, Hongchao
    Dong, Ping
    Zhang, Hongke
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4740 - 4743
  • [23] On Authentication in a Connected Vehicle: Secure Integration of Mobile Devices with Vehicular Networks
    Han, Kyusuk
    Potluri, Swapna Divya
    Shin, Kang G.
    2013 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2013, : 160 - 169
  • [24] Toward Secure User-Habit-Oriented Authentication for Mobile Devices
    Seto, Jamie
    Wang, Ye
    Lin, Xiaodong
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 1225 - 1231
  • [25] A provably secure lightweight authentication protocol in mobile edge computing environments
    Tsu-Yang Wu
    Qian Meng
    Lei Yang
    Xinglan Guo
    Saru Kumari
    The Journal of Supercomputing, 2022, 78 : 13893 - 13914
  • [26] Three Party Post Quantum Secure Lattice Based Construction of Authenticated Key Establishment Protocol for Mobile Communication
    Kumar, Sunil
    Mittal, Gaurav
    Yadav, Arvind
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (03)
  • [27] Protocol of secure mutual authentication
    Miloslavskaya, Natalia
    Tolstoy, Alexander
    Ushakov, Dmitriy
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 43 - +
  • [28] ECCbAP: A secure ECC-based authentication protocol for IoT edge devices
    Rostampour S.
    Safkhani M.
    Bendavid Y.
    Bagheri N.
    Pervasive and Mobile Computing, 2020, 67
  • [29] (In)secure Acoustic Mobile Authentication
    Han, Dianqi
    Li, Ang
    Li, Tao
    Zhang, Lili
    Zhang, Yan
    Li, Jiawei
    Zhang, Rui
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (09) : 3193 - 3207
  • [30] Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 457 - 467