Provably secure lightweight certificateless lattice-based authenticated key exchange scheme for IIoT

被引:0
|
作者
Tan, Zuowen [1 ]
Jiao, Jintao [1 ,2 ]
Chen, Yanliang [1 ,3 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang, Peoples R China
[2] Fujian Key Lab Big Data Applicat & Intellectualiza, Wuyishan, Peoples R China
[3] Jiangxi Univ Finance & Econ, Coll Modern Econ & Management, Jiujiang, Peoples R China
来源
关键词
authentication protocol; industrial IoT; key agreement; post quantum cryptography; NETWORKS;
D O I
10.1002/cpe.7983
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Through the Industrial Internet of Things (IIoT), the manufacturing enterprises have significantly enhanced the production efficiency. The transmission of data in IIoT over public channels has brought about information leakage issues. Therefore, it is crucial to agree on a session key among the participants. In recent years, numerous authenticated key exchange (AKE) schemes have been designed. However, those AKE schemes which adopt the certificateless approach to tackle certificate management and key escrow may remain vulnerable to quantum attacks, and other AKE schemes which are based on lattice hard problem so as to achieve the post quantum security may incur key management issues. To simultaneously address the aforementioned challenges, we propose a lightweight certificateless lattice-based authenticated key exchange (C2LAKE) scheme. Upon the hardness assumptions of the inhomogeneous small integer solution (ISIS) and computational bilateral inhomogeneous small integer solution (CBi-ISIS) problems, the C2LAKE scheme has been demonstrated to be secure in the eCK model and the random oracle model (ROM). Better trade-off among security and functionality features, and communication and computation costs make the C2LAKE scheme suitable and applicable in the IIoT environment.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [42] Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments
    Xiong, Hu
    Mei, Qian
    Zhao, Yanan
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 310 - 320
  • [43] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [44] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [45] Strongly secure certificateless one-pass authenticated key agreement scheme
    Huang, Baojun
    Tu, Hang
    KUWAIT JOURNAL OF SCIENCE, 2015, 42 (01) : 91 - 108
  • [46] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988
  • [47] Provably secure CL-KEM-based password-authenticated key exchange protocol
    Yang, Junhan
    Su, Bo
    Guo, Chaoping
    Han, Wenlin
    Xiao, Yang
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2017, 23 (02) : 113 - 122
  • [48] A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
    Zhang, Ke
    Xu, Kai
    Wei, Fushan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [49] PDAKE Provably Secure PUF-Based Device Authenticated Key Exchange in Cloud Setting
    Byun, Jin Wook
    IEEE ACCESS, 2019, 7 : 181165 - 181177
  • [50] An efficient and provably secure authenticated key agreement scheme for mobile edge computing
    Rakeei, Mohammadamin
    Moazami, Farokhlagha
    WIRELESS NETWORKS, 2022, 28 (07) : 2983 - 2999