A computationally efficient and randomized RLWE-based key exchange scheme

被引:1
|
作者
Pursharthi, Komal [1 ]
Mishra, Dheerendra [1 ]
机构
[1] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal, India
关键词
Computational efficiency; Post-quantum security; Key exchange; Ring learning with errors (RLWE); AVERAGE-CASE REDUCTIONS;
D O I
10.1007/s10586-023-04032-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key exchange enables two or more entities to agree on an identical key. In post-quantum, the construction of ring learning with error (RLWE) based key exchange provides a strong provable secure, and efficient solution. The resistance against signal leakage and key mismatch attacks is essential for developing secure RLWE-based key exchange mechanisms for the quantum era. RLWE-based key exchange schemes are developed in recent years, however, most of them found vulnerable to attacks or have higher computational costs. We have analyzed the existing contributions and defined a mechanism to achieve a computationally efficient and secure solution. To improve security and reduce computing overhead, we are introducing a new key exchange technique to attain efficiency and security against signal leakage and key mismatch attacks. Our scheme is proven secure by the random oracle model (ROM). Moreover, we have provided a performance evaluation of computation cost competing with other existing key exchange techniques.
引用
收藏
页码:1599 / 1610
页数:12
相关论文
共 50 条
  • [31] Efficient three-party password-based key exchange scheme
    Lou, Der-Chyuan
    Huang, Hui-Feng
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 504 - 512
  • [32] A key exchange scheme based on lattice
    Li, Wulu
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 100 - 106
  • [33] On the Security of a Secure and Computationally Efficient Authentication and Key Agreement Scheme for Internet of Vehicles
    Park, Kisung
    Kim, Myeonghyun
    Park, Youngho
    ELECTRONICS, 2024, 13 (16)
  • [34] Encrypted Dynamic Control Exploiting Limited Number of Multiplications and a Method Using RLWE-based Cryptosystem
    Lee, Joowon
    Lee, Donggil
    Kim, Junsoo
    Shim, Hyungbo
    IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2025, 55 (01) : 158 - 169
  • [35] Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World
    Ding, Jintai
    Alsayigh, Saed
    Lancrenon, Jean
    Saraswathy, R., V
    Snook, Michael
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 183 - 204
  • [36] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Simplicio, Marcos A., Jr.
    Sakuragui, Rony R. M.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1443 - 1449
  • [37] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3972 - 3979
  • [38] Efficient password-based authentication and key exchange scheme preserving user privacy
    Chai, Zhenchuan
    Cao, Zhenfu
    Lu, Rongxing
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2006, 4138 : 467 - 477
  • [39] A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment
    Byung-Wook Jin
    Jung-Oh Park
    Hyung-Jin Mun
    Wireless Personal Communications, 2019, 105 : 599 - 618
  • [40] A computationally efficient authentication and key agreement scheme for multi-server switching in WBAN
    Xu, Zisang
    Xu, Cheng
    Xu, Jianbo
    Meng, Xiangwei
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2021, 35 (03) : 143 - 160