Quantum secure two party authentication protocol for mobile devices

被引:1
|
作者
Moony, Bshisht [1 ]
Barnwal, Amit K. [1 ]
Singh, Mrityunjay [2 ]
Mishra, Dheerendra [3 ]
机构
[1] MMM Univ Technol, Dept Math & Sci Comp, Gorakhpur 273010, India
[2] SRM Univ AP, Dept Comp Sci & Engn, Amaravati 522240, Andhra Prades, India
[3] Maulana Azad Natl Inst Technol, Dept Math Bioinformat & Comp Applicat, Bhopal 462003, India
关键词
Mobile communication; Communication security; Authentication; Lattice based cryptography;
D O I
10.1007/s12083-023-01534-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design's usefulness.
引用
收藏
页码:2548 / 2559
页数:12
相关论文
共 50 条
  • [1] Quantum secure two party authentication protocol for mobile devices
    Bshisht Moony
    Amit K. Barnwal
    Mrityunjay Singh
    Dheerendra Mishra
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2548 - 2559
  • [2] Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices
    Chaudhary, Dharminder
    Kumar Dadsena, Pradeep
    Padmavathi, A.
    Mehedi Hassan, Mohammad
    Fahad Alkhamees, Bader
    Kumar, Uddeshaya
    [J]. IEEE ACCESS, 2024, 12 : 74572 - 74585
  • [3] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    [J]. ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [4] Secure Authentication Protocol for Mobile Payment
    Fan, Kai
    Li, Hui
    Jiang, Wei
    Xiao, Chengsheng
    Yang, Yintang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 610 - 620
  • [5] Secure Authentication Protocol for Mobile Payment
    Kai Fan
    Hui Li
    Wei Jiang
    Chengsheng Xiao
    Yintang Yang
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 610 - 620
  • [6] Research of secure two-party quantum comparing protocol
    Liu Wen
    Wang Yong-Bin
    [J]. ACTA PHYSICA SINICA, 2011, 60 (03)
  • [7] A Protocol of Quantum Authentication with Secure Quantum Passwords
    Hotta, Masahiro
    Ozawa, Masanao
    [J]. QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING (QCMC), 2009, 1110 : 388 - +
  • [8] A protocol for the secure two-party quantum scalar product
    He, Li-Bao
    Huang, Liu-Sheng
    Yang, Wei
    Xu, Rui
    [J]. PHYSICS LETTERS A, 2012, 376 (16) : 1323 - 1327
  • [9] Two-party Mutual Authentication Quantum Key Agreement Protocol
    Ye-Feng He
    Yu-Ru Yue
    Man Di
    Wen-Ping Ma
    [J]. International Journal of Theoretical Physics, 61
  • [10] Two-party Mutual Authentication Quantum Key Agreement Protocol
    He, Ye-Feng
    Yue, Yu-Ru
    Di, Man
    Ma, Wen-Ping
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (05)