Quantum secure two party authentication protocol for mobile devices

被引:0
|
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [21] A Secure User Authentication Protocol for Heterogeneous Mobile Environments
    Hassan, Alzubair
    Hamza, Rafik
    Li, Fagen
    Ali, Awad
    Bashir, Mohammed Bakri
    Alqhtani, Samar M.
    Tawfeeg, Tawfeeg Mohmmed
    Yousif, Adil
    IEEE ACCESS, 2022, 10 : 69757 - 69770
  • [22] A secure and efficient authentication protocol for mobile RFID systems
    Sandhya, M.
    Rangaswamy, T.R.
    Journal of Digital Information Management, 2011, 9 (03): : 99 - 105
  • [23] An interactive and secure user authentication scheme for mobile devices
    Sun, Qibin
    Li, Zhi
    Jiang, Xudong
    Kot, Alex
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2973 - +
  • [24] Secure and Lightweight Authentication Protocol for Mobile RFID Privacy
    Lee, Hyeong-Chan
    Eom, TaeYang
    Yi, Jeong Hyun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 421 - 426
  • [25] A Facial Authentication System Using Post-Quantum-Secure Data Generated on Mobile Devices
    Lopez-Gonzalez, Paula
    Arjona, Rosario
    Roman, Roberto
    Baturone, Iluminada
    PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022, 2022, : 803 - 805
  • [26] A Quasi Quantum Secure Direct Communication Protocol with Authentication
    Chen Zuning
    Qin Zheng
    Wang Xianhui
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 48 - 52
  • [27] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [28] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [29] Cryptanalysis of A Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 1063 - 1068
  • [30] Restoration Protocol: Lightweight and Secure Devices Authentication Based on PUF
    Ovilla-Martinez, Brisbane
    Bossuet, Lilian
    2017 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2017, : 43 - 48