Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT

被引:0
|
作者
Tan, Zuowen [1 ]
Jiao, Jintao [1 ,2 ]
Chen, Yanliang [1 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang, Peoples R China
[2] Fujian Key Lab Big Data Applicat & Intellectualiza, Wuyishan, Peoples R China
[3] Jiangxi Univ Finance & Econ, Coll Modern Econ & Management, Jiujiang, Peoples R China
来源
关键词
authentication protocol; industrial IoT; key agreement; post quantum cryptography; NETWORKS;
D O I
10.1002/cpe.7983
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Through the Industrial Internet of Things (IIoT), the manufacturing enterprises have significantly enhanced the production efficiency. The transmission of data in IIoT over public channels has brought about information leakage issues. Therefore, it is crucial to agree on a session key among the participants. In recent years, numerous authenticated key exchange (AKE) schemes have been designed. However, those AKE schemes which adopt the certificateless approach to tackle certificate management and key escrow may remain vulnerable to quantum attacks, and other AKE schemes which are based on lattice hard problem so as to achieve the post quantum security may incur key management issues. To simultaneously address the aforementioned challenges, we propose a lightweight certificateless lattice-based authenticated key exchange (C2LAKE) scheme. Upon the hardness assumptions of the inhomogeneous small integer solution (ISIS) and computational bilateral inhomogeneous small integer solution (CBi-ISIS) problems, the C2LAKE scheme has been demonstrated to be secure in the eCK model and the random oracle model (ROM). Better trade-off among security and functionality features, and communication and computation costs make the C2LAKE scheme suitable and applicable in the IIoT environment.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
    Karati, Arijit
    Islam, S. K. Hafizul
    Karuppiah, Marimuthu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3701 - 3711
  • [2] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [3] Fully Secure Lightweight Certificateless Signature Scheme for IIoT
    Rezaeibagha, Fatemeh
    Mu, Yi
    Huang, Xinyi
    Yang, Wenjie
    Huang, Ke
    IEEE ACCESS, 2019, 7 : 144433 - 144443
  • [4] A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
    Banerjee, Soumya
    Odelu, Vanga
    Das, Ashok Kumar
    Srinivas, Jangirala
    Kumar, Neeraj
    Chattopadhyay, Samiran
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) : 8739 - 8752
  • [5] A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
    Seyhan, Kubra
    Akleylek, Sedat
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [6] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [7] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [8] Lattice-Based Authenticated Key Exchange with Tight Security
    Pan, Jiaxin
    Wagner, Benedikt
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 616 - 647
  • [9] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [10] Lattice-based certificateless encryption scheme
    Jiang, Mingming
    Hu, Yupu
    Lei, Hao
    Wang, Baocang
    Lai, Qiqi
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 828 - 836