Quantum secure two party authentication protocol for mobile devices

被引:0
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
来源
Peer-to-Peer Networking and Applications | 2023年 / 16卷
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [31] ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks
    Parne, Balu L.
    Gupta, Shubham
    Chaudhari, Narendra S.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2018, 43 (06):
  • [32] An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing
    Ji, Sai
    Yuan, Yang
    Shen, Jian
    Lai, Chin-Feng
    Chen, Bofan
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (03): : 437 - 448
  • [33] PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication
    Gebali, Fayez
    Elhadad, Mohamed K.
    COMPUTERS, 2023, 12 (11)
  • [34] ESAP: Efficient and secure authentication protocol for roaming user in mobile communication networks
    BALU L PARNE
    SHUBHAM GUPTA
    NARENDRA S CHAUDHARI
    Sādhanā, 2018, 43
  • [35] Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices
    Feng, Qi
    He, Debiao
    Zeadally, Sherali
    Kumar, Neeraj
    Liang, Kaitai
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2775 - 2785
  • [36] Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices
    Qiu, Shuming
    Wang, Ding
    Xu, Guoai
    Kumari, Saru
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1338 - 1351
  • [37] Two-Party Mobile Authentication Protocols for Wireless Roaming Networks
    Almuhaideb, Abdullah
    Phu Dung Le
    Srinivasan, Bala
    2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
  • [38] Towards Nonintrusive and Secure Mobile Two-Factor Authentication on Wearables
    Cao, Yetong
    Li, Fan
    Zhang, Qian
    Yang, Song
    Wang, Yu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (05) : 3046 - 3061
  • [39] A secure privacy and authentication protocol for passive RFID tags
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2017, 15 (03) : 266 - 277
  • [40] An enhanced three-party authentication key exchange protocol for mobile commerce environments
    Tan Z.
    Journal of Communications, 2010, 5 (05): : 436 - 443