2024
DOI: 10.7717/peerj-cs.1791
|View full text |Cite
|
Sign up to set email alerts
|

A new lattice-based password authenticated key exchange scheme with anonymity and reusable key

Kübra Seyhan,
Sedat Akleylek

Abstract: In this article, we propose a novel bilateral generalization inhomogenous short integer solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post-quantum era security. The hardness assumption of the constructed PAKE is based on newly proposed hard lattice problem, BiGISIS. The main aim of this article is to provide a solution for the post-quantum secure PAKE scheme, which is one of the open problems in the literature. The proposed PAKE is the first BiGISIS-based PAKE that satisfies an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Note that two other lattice-based PAKE schemes ( Dabra, Bala & Kumari, 2020 ; Ding, Cheng & Qin, 2022 ; Seyhan & Akleylek, 2024 ) for two-party mobile device security were proposed using different approaches, hardness, and additional properties. When we checked the proposals, no source code was given, and the results were not provided for all metrics, such as memory, CPU, and energy usage.…”
Section: Reference Implementation and Comparison Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that two other lattice-based PAKE schemes ( Dabra, Bala & Kumari, 2020 ; Ding, Cheng & Qin, 2022 ; Seyhan & Akleylek, 2024 ) for two-party mobile device security were proposed using different approaches, hardness, and additional properties. When we checked the proposals, no source code was given, and the results were not provided for all metrics, such as memory, CPU, and energy usage.…”
Section: Reference Implementation and Comparison Resultsmentioning
confidence: 99%
“…The security-related examinations were done by following ROM definitions. In Seyhan & Akleylek (2024) , we also built a four-phase PAKE to achieve reusable key and anonymity features for mobile device-server communication model. In the security analysis, we followed RoR assumptions to prove the semantic security.…”
Section: Introductionmentioning
confidence: 99%