Quantum secure two party authentication protocol for mobile devices

被引:0
|
作者
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
机构
[1] MMM University of Technology,Department of Mathematics and Scientific Computing
[2] SRM University AP,School of Computing Science and Engineering
[3] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.
引用
收藏
页码:2548 / 2559
页数:11
相关论文
共 50 条
  • [41] A secure three-factor authentication protocol for mobile networks
    Kumar, Devender
    Chand, Satish
    Kumar, Bijendra
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (02)
  • [42] Secure Authentication for Mobile Devices Based on Acoustic Background Fingerprint
    Quan Quach
    Ngu Nguyen
    Tien Dinh
    KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2013), VOL 1, 2014, 244 : 375 - 387
  • [43] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [44] Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
    Moon, Jongho
    Lee, Youngsook
    Kim, Jiye
    Won, Dongho
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [45] Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices
    Wang, Yilei
    Yang, Guoyu
    Li, Tao
    Li, Fengyin
    Tian, Youliang
    Yu, Xiaomei
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 161
  • [46] Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling
    Chaonan Wang
    Qian Zhang
    Shufan Liang
    Hongfeng Zhu
    Quantum Information Processing, 23
  • [47] Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling
    Wang, Chaonan
    Zhang, Qian
    Liang, Shufan
    Zhu, Hongfeng
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [48] A secure m-payment protocol for mobile devices
    Hashemi, Mahmoud Reza
    Soroush, Elahe
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1325 - +
  • [49] Two-Party Mutual Authentication Quantum Key Agreement Protocol Based on Bell States
    He Y.
    Di M.
    Pang Y.
    Yue Y.
    Li G.
    Liu J.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2022, 51 (04): : 488 - 492
  • [50] A SECURE E-MAIL PROTOCOL FOR MOBILE DEVICES
    Chang, Chin-Chen
    Lee, Chia-Yin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5353 - 5362