Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT

被引:0
|
作者
Tan, Zuowen [1 ]
Jiao, Jintao [1 ,2 ]
Chen, Yanliang [1 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang, Peoples R China
[2] Fujian Key Lab Big Data Applicat & Intellectualiza, Wuyishan, Peoples R China
[3] Jiangxi Univ Finance & Econ, Coll Modern Econ & Management, Jiujiang, Peoples R China
来源
关键词
authentication protocol; industrial IoT; key agreement; post quantum cryptography; NETWORKS;
D O I
10.1002/cpe.7983
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Through the Industrial Internet of Things (IIoT), the manufacturing enterprises have significantly enhanced the production efficiency. The transmission of data in IIoT over public channels has brought about information leakage issues. Therefore, it is crucial to agree on a session key among the participants. In recent years, numerous authenticated key exchange (AKE) schemes have been designed. However, those AKE schemes which adopt the certificateless approach to tackle certificate management and key escrow may remain vulnerable to quantum attacks, and other AKE schemes which are based on lattice hard problem so as to achieve the post quantum security may incur key management issues. To simultaneously address the aforementioned challenges, we propose a lightweight certificateless lattice-based authenticated key exchange (C2LAKE) scheme. Upon the hardness assumptions of the inhomogeneous small integer solution (ISIS) and computational bilateral inhomogeneous small integer solution (CBi-ISIS) problems, the C2LAKE scheme has been demonstrated to be secure in the eCK model and the random oracle model (ROM). Better trade-off among security and functionality features, and communication and computation costs make the C2LAKE scheme suitable and applicable in the IIoT environment.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [22] Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things
    Wei, Guanglu
    Fan, Kai
    Zhang, Kuan
    Wang, Haoyang
    Li, Hui
    Yang, Yintang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 9213 - 9225
  • [23] A Lightweight Certificateless Mutual Authentication Scheme Based on Signatures for IIoT
    Yin, Deshuai
    Gong, Bei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (16): : 26852 - 26865
  • [24] Practical provably-secure authenticated encryption schemes using lattice-based pseudorandom function SPRING
    Boorghany, A.
    Bayat-Sarmadi, S.
    Jalili, R.
    SCIENTIA IRANICA, 2018, 25 (06) : 3442 - 3460
  • [25] A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 17 - 31
  • [26] A provably secure smart card-based authenticated group key exchange protocol
    Chang, Chin-Chen
    Le, Hai-Duong
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1602 - 1607
  • [27] A Lattice-Based Certificateless Secure Data Transmission Scheme for Internet of Vehicles Based-Blockchain
    Chen, Chen
    Wang, Lankai
    Shi, Quan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (02) : 2308 - 2322
  • [28] Compact and Provably Secure Lattice-Based Signatures in Hardware
    Howe, James
    Rafferty, Ciara
    Khalid, Ayesha
    O'Neill, Maire
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017,
  • [29] Provably secure authenticated key exchange protocol under the CDH assumption
    Zhao, Jianjie
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (11) : 2297 - 2304
  • [30] Provably secure authenticated group Diffie-Hellman key exchange
    Bresson, Emmanuel
    Chevassut, Olivier
    Pointcheval, David
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (03)