Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices

Journal of Information Security and Applications - Tập 75 - Trang 103505 - 2023
Purva Rewal1, Mrityunjay Singh2, Dheerendra Mishra1, Komal Pursharthi1, Ankita Mishra3
1Department of Mathematics, Maulana Azad National Institute of Technology, Bhopal 462003, India
2School of Computing Science and Engineering, VIT Bhopal University, Sehore, Madhya Pradesh 466114, India
3Department of Mathematics, Govt Motilal Vigyan Mahavidyalaya, Bhopal 462008, India

Tài liệu tham khảo

Ding, 2022, Further analysis and improvements of a lattice-based anonymous PAKE scheme, IEEE Syst J, 16, 5035, 10.1109/JSYST.2022.3161264 Islam, 2021, PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments, J Inf Secur Appl, 63 Shor, 1994, Algorithms for quantum computation: discrete logarithms and factoring, 124 Shor, 1999, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Rev, 41, 303, 10.1137/S0036144598347011 Kumari, 2022, A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices, Comput Netw, 217, 10.1016/j.comnet.2022.109327 Dharminder, 2022, Post-quantum lattice based secure reconciliation enabled key agreement protocol for IoT, IEEE Internet Things J Ren, 2022, Practical post-quantum password-authenticated key exchange based-on module-lattice, 137 Diffie, 1976, New directions in cryptography, IEEE Trans Inform Theory, 22, 644, 10.1109/TIT.1976.1055638 Ren, 2022, Efficient module learning with errors-based post-quantum password-authenticated key exchange, IET Inf Secur Lyubashevsky, 2013, On ideal lattices and learning with errors over rings, J ACM, 60, 1, 10.1145/2535925 Zhang, 2015, Authenticated key exchange from ideal lattices, 719 Alkim E, Ducas L, Pöppelmann T, Schwabe P. Post-quantum Key {Exchange—A} New Hope. In: 25th USENIX security symposium. 2016, p. 327–43. Bos, 2015, Post-quantum key exchange for the TLS protocol from the ring learning with errors problem, 553 Ding, 2017, Provably secure password authenticated key exchange based on RLWE for the post-quantum world, 183 Feng, 2018, Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Syst J, 13, 2775, 10.1109/JSYST.2018.2851295 Ding, 2018 Xu, 2017 Choi R, An H, Kim K, et al. AtLast: Another three-party lattice-based PAKE scheme. In: Proceedings of the 2018 symposium on cryptography and information security. 2018. J.X., 2018, Password-based three-party authenticated key exchange protocol from lattices, J Commun, 39, 87 Liu, 2019, Provably secure three-party password-based authenticated key exchange from RLWE (full version), Cryptology ePrint Archive, 11879, 56 Shu, 2021, Verifier-based three-party password-authenticated key exchange protocol from ideal lattices, J Cryptol Res, 8, 294 Peikert, 2014, Lattice cryptography for the internet, 197 Yao, 2019, A privacy-preserving RLWE-based remote biometric authentication scheme for single and multi-server environments, IEEE Access, 7, 109597, 10.1109/ACCESS.2019.2933576 Lwamo, 2019, SUAA: A secure user authentication scheme with anonymity for the single & multi-server environments, Inform Sci, 477, 369, 10.1016/j.ins.2018.10.037 Rana, 2021, Lattice-based key agreement protocol under ring-LWE problem for IoT-enabled smart devices, Sādhanā, 46, 1, 10.1007/s12046-021-01607-2 Tang, 2021, Improved verifier-based three-party password-authenticated key exchange protocol from ideal lattices, Secur Commun Netw, 2021, 10.1155/2021/6952869 Dabra, 2020, LBA-PAKE: Lattice-based anonymous password authenticated key exchange for mobile devices, IEEE Syst J, 15, 5067, 10.1109/JSYST.2020.3023808 Dharminder, 2021, LWEDM: Learning with error based secure mobile digital rights management system, Trans Emerg Telecommun Technol, 32 Guo, 2022 Kumar, 2022, Learning with error-based key agreement and authentication scheme for satellite communication, Int J Satell Commun Netw, 40, 83, 10.1002/sat.1417 Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on theory of computing. 2008, p. 197–206. Micciancio, 2007, Worst-case to average-case reductions based on Gaussian measures, SIAM J Comput, 37, 267, 10.1137/S0097539705447360 Shoup, 2004 Islam, 2020, Provably secure two-party authenticated key agreement protocol for post-quantum environments, J Inf Secur Appl, 52 Groza, 2019, CarINA-car sharing with IdeNtity based access control re-enforced by TPM, 210 Farash, 2014, An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps, Nonlinear Dynam, 77, 399, 10.1007/s11071-014-1304-6 Islam, 2015, Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, Inform Sci, 312, 104, 10.1016/j.ins.2015.03.050 Lv, 2013, An novel three-party authenticated key exchange protocol using one-time key, J Netw Comput Appl, 36, 498, 10.1016/j.jnca.2012.04.006 Zhao, 2013, Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials, Nonlinear Dynam, 74, 419, 10.1007/s11071-013-0979-4