A computationally efficient and randomized RLWE-based key exchange scheme

被引:0
|
作者
Komal Pursharthi
Dheerendra Mishra
机构
[1] Maulana Azad National Institute of Technology,Department of Mathematics, Bioinformatics and Computer Applications
来源
Cluster Computing | 2024年 / 27卷
关键词
Computational efficiency; Post-quantum security; Key exchange; Ring learning with errors (RLWE);
D O I
暂无
中图分类号
学科分类号
摘要
Key exchange enables two or more entities to agree on an identical key. In post-quantum, the construction of ring learning with error (RLWE) based key exchange provides a strong provable secure, and efficient solution. The resistance against signal leakage and key mismatch attacks is essential for developing secure RLWE-based key exchange mechanisms for the quantum era. RLWE-based key exchange schemes are developed in recent years, however, most of them found vulnerable to attacks or have higher computational costs. We have analyzed the existing contributions and defined a mechanism to achieve a computationally efficient and secure solution. To improve security and reduce computing overhead, we are introducing a new key exchange technique to attain efficiency and security against signal leakage and key mismatch attacks. Our scheme is proven secure by the random oracle model (ROM). Moreover, we have provided a performance evaluation of computation cost competing with other existing key exchange techniques.
引用
下载
收藏
页码:1599 / 1610
页数:11
相关论文
共 50 条
  • [41] A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment
    Jin, Byung-Wook
    Park, Jung-Oh
    Mun, Hyung-Jin
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (02) : 599 - 618
  • [42] A secure and efficient authenticated key exchange scheme for smart grid
    Xia, Zhe
    Liu, Tao
    Wang, Jingjing
    Chen, Shi
    HELIYON, 2023, 9 (07)
  • [43] Compact and Simple RLWE Based Key Encapsulation Mechanism
    Alkim, Erdem
    Bilgin, Yusuf Alper
    Cenk, Murat
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2019, 2019, 11774 : 237 - 256
  • [44] A distributed and computationally secure key distribution scheme
    Daza, V
    Herranz, J
    Padró, C
    Sáez, G
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 342 - 356
  • [45] Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE
    Liu, Chao
    Zheng, Zhongxiang
    Jia, Keting
    You, Qidi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 56 - 72
  • [46] A computationally efficient HMAC-based authentication scheme for network coding
    Tandoh Lawrence
    Fagen Li
    Ikram Ali
    Charles R. Haruna
    Michael Y. Kpiebaareh
    Tandoh Christopher
    Telecommunication Systems, 2022, 79 : 47 - 69
  • [47] A computationally efficient block transmission scheme based on approximated Cholesky factors
    Sinn, C. Vincent
    Bielefeld, Daniel
    Goeze, Juegen
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 1786 - +
  • [48] Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage
    Ding, Jintai
    Fluhrer, Scott
    Rv, Saraswathy
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 467 - 486
  • [49] A computationally efficient HMAC-based authentication scheme for network coding
    Lawrence, Tandoh
    Li, Fagen
    Ali, Ikram
    Haruna, Charles R.
    Kpiebaareh, Michael Y.
    Christopher, Tandoh
    TELECOMMUNICATION SYSTEMS, 2022, 79 (01) : 47 - 69
  • [50] Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme
    Wu, Shuhua
    Chen, Kefei
    Pu, Qiong
    Zhu, Yuefei
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 674 - 686