Quantum secure two party authentication protocol for mobile devices

被引:0
|
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [31] Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
    Das, Ashok Kumar
    Wazid, Mohammad
    Kumar, Neeraj
    Khan, Muhammad Khurram
    Choo, Kim-Kwang Raymond
    Park, YoungHo
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2018, 22 (04) : 1310 - 1322
  • [32] A Secure Authentication Protocol using HOTP on USB Storage Devices
    Tritilanunt, Suratose
    Thanyamanorot, Napat
    Ritdecha, Nattawut
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1908 - +
  • [33] A secure authentication protocol for wearable devices environment using ECC
    Kumar, Devender
    Grover, Harmanpreet Singh
    Adarsh
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 (8-15) : 8 - 15
  • [34] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [35] Secure authentication protocol in mobile IPv6 networks
    Koo, Jung Doo
    Koo, Jung Sook
    Lee, Dong Chun
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2006, 4253 : 548 - 555
  • [36] Cryptanalysis and improvement of an efficient two-party authentication key exchange protocol for mobile environment
    Park, KiSung
    Lee, KyungKeun
    Park, YoungHo
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 72 - 73
  • [37] Secure and Efficient Mutual Authentication Scheme for NFC Mobile Devices
    You-Han Tung
    Wen-Shenq Juang
    Journal of Electronic Science and Technology, 2017, 15 (03) : 240 - 245
  • [38] A secure image-based authentication scheme for mobile devices
    Li, Z
    Sun, QB
    Lian, Y
    Giusto, DD
    ADVANCES IN INTELLIGENT COMPUTING, PT 2, PROCEEDINGS, 2005, 3645 : 751 - 760
  • [39] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [40] Anonymous and lightweight secure authentication protocol for mobile Agent system
    Berguig, Yousra
    Laassiri, Jalal
    Hanaoui, Sanae
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63