Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices
Tài liệu tham khảo
Ding, 2022, Further analysis and improvements of a lattice-based anonymous PAKE scheme, IEEE Syst J, 16, 5035, 10.1109/JSYST.2022.3161264
Islam, 2021, PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments, J Inf Secur Appl, 63
Shor, 1994, Algorithms for quantum computation: discrete logarithms and factoring, 124
Shor, 1999, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Rev, 41, 303, 10.1137/S0036144598347011
Kumari, 2022, A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices, Comput Netw, 217, 10.1016/j.comnet.2022.109327
Dharminder, 2022, Post-quantum lattice based secure reconciliation enabled key agreement protocol for IoT, IEEE Internet Things J
Ren, 2022, Practical post-quantum password-authenticated key exchange based-on module-lattice, 137
Diffie, 1976, New directions in cryptography, IEEE Trans Inform Theory, 22, 644, 10.1109/TIT.1976.1055638
Ren, 2022, Efficient module learning with errors-based post-quantum password-authenticated key exchange, IET Inf Secur
Lyubashevsky, 2013, On ideal lattices and learning with errors over rings, J ACM, 60, 1, 10.1145/2535925
Zhang, 2015, Authenticated key exchange from ideal lattices, 719
Alkim E, Ducas L, Pöppelmann T, Schwabe P. Post-quantum Key {Exchange—A} New Hope. In: 25th USENIX security symposium. 2016, p. 327–43.
Bos, 2015, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, 553
Ding, 2017, Provably secure password authenticated key exchange based on RLWE for the post-quantum world, 183
Feng, 2018, Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Syst J, 13, 2775, 10.1109/JSYST.2018.2851295
Ding, 2018
Xu, 2017
Choi R, An H, Kim K, et al. AtLast: Another three-party lattice-based PAKE scheme. In: Proceedings of the 2018 symposium on cryptography and information security. 2018.
J.X., 2018, Password-based three-party authenticated key exchange protocol from lattices, J Commun, 39, 87
Liu, 2019, Provably secure three-party password-based authenticated key exchange from RLWE (full version), Cryptology ePrint Archive, 11879, 56
Shu, 2021, Verifier-based three-party password-authenticated key exchange protocol from ideal lattices, J Cryptol Res, 8, 294
Peikert, 2014, Lattice cryptography for the internet, 197
Yao, 2019, A privacy-preserving RLWE-based remote biometric authentication scheme for single and multi-server environments, IEEE Access, 7, 109597, 10.1109/ACCESS.2019.2933576
Lwamo, 2019, SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments, Inform Sci, 477, 369, 10.1016/j.ins.2018.10.037
Rana, 2021, Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices, Sādhanā, 46, 1, 10.1007/s12046-021-01607-2
Tang, 2021, Improved verifier-based three-party password-authenticated key exchange protocol from ideal lattices, Secur Commun Netw, 2021, 10.1155/2021/6952869
Dabra, 2020, LBA-PAKE: Lattice-based anonymous password authenticated key exchange for mobile devices, IEEE Syst J, 15, 5067, 10.1109/JSYST.2020.3023808
Dharminder, 2021, LWEDM: Learning with error based secure mobile digital rights management system, Trans Emerg Telecommun Technol, 32
Guo, 2022
Kumar, 2022, Learning with error-based key agreement and authentication scheme for satellite communication, Int J Satell Commun Netw, 40, 83, 10.1002/sat.1417
Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on theory of computing. 2008, p. 197–206.
Micciancio, 2007, Worst-case to average-case reductions based on Gaussian measures, SIAM J Comput, 37, 267, 10.1137/S0097539705447360
Shoup, 2004
Islam, 2020, Provably secure two-party authenticated key agreement protocol for post-quantum environments, J Inf Secur Appl, 52
Groza, 2019, CarINA-car sharing with IdeNtity based access control re-enforced by TPM, 210
Farash, 2014, An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps, Nonlinear Dynam, 77, 399, 10.1007/s11071-014-1304-6
Islam, 2015, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, Inform Sci, 312, 104, 10.1016/j.ins.2015.03.050
Lv, 2013, An novel three-party authenticated key exchange protocol using one-time key, J Netw Comput Appl, 36, 498, 10.1016/j.jnca.2012.04.006
Zhao, 2013, Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials, Nonlinear Dynam, 74, 419, 10.1007/s11071-013-0979-4