Quantum secure two party authentication protocol for mobile devices

被引:0
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
来源
Peer-to-Peer Networking and Applications | 2023年 / 16卷
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [41] A Secure Authentication Protocol for Internet of Vehicles
    Chen, Chien-Ming
    Xiang, Bin
    Liu, Yining
    Wang, King-Hang
    IEEE ACCESS, 2019, 7 : 12047 - 12057
  • [42] A Secure and Efficient Deniable Authentication Protocol
    Xin Xiangjun
    Chen Dongsheng
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 172 - 175
  • [43] Authentication primitives for secure protocol specifications
    Bodei, C
    Degano, P
    Focardi, R
    Priami, C
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (05): : 645 - 653
  • [44] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    K. Selvi
    K. Muthumanickam
    P. Vijayalakshmi
    P. C. Senthil Mahesh
    The Journal of Supercomputing, 2023, 79 : 12191 - 12218
  • [45] ECC-reliant secure authentication protocol for cloud server and smart devices in IoT
    Selvi, K.
    Muthumanickam, K.
    Vijayalakshmi, P.
    Mahesh, P. C. Senthil
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11) : 12191 - 12218
  • [46] An enhanced three-party authentication key exchange protocol for mobile commerce environments
    Tan Z.
    Journal of Communications, 2010, 5 (05): : 436 - 443
  • [47] 2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment
    Park, Kisung
    Park, Youngho
    Park, Yohan
    Das, Ashok Kumar
    IEEE ACCESS, 2018, 6 : 30225 - 30241
  • [48] A secure ECC-based mobile RFID mutual authentication protocol and its application
    Chiou, Shin-Yan
    Ko, Wen-Tsai
    Lu, Erl-Huei
    International Journal of Network Security, 2018, 20 (02): : 396 - 402
  • [49] SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices
    Khan, Rasib
    Hasan, Ragib
    Xu, Jinfang
    2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 41 - 50
  • [50] A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices
    Ji, Xiaoyu
    Zhou, Xinyan
    Yan, Chen
    Deng, Jiangyi
    Xu, Wenyuan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (04) : 1155 - 1171