2017
DOI: 10.1002/dac.3473
|View full text |Cite
|
Sign up to set email alerts
|

A novel and efficient lattice‐based authenticated key exchange protocol in C‐K model

Abstract: Key exchange protocols play an important role in securing the network communication over an insecure channel. In literature, a large number of key exchange schemes exist. The security of most of them is based on the Diffie-Hellman (DH) problems over a group. But these types of DH problems are solvable in the presence of quantum computers. Thus, we require a non-DH type key exchange scheme that resists to the quantum computers and new modern technologies. In this paper, 2 novel lattice-based authenticated key e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(14 citation statements)
references
References 30 publications
0
14
0
Order By: Relevance
“…The research of Gupta and Biswas [29] deals with the novel and efficient lattice‐based authenticated key exchange protocol in Canetti‐Krawczyk model. According to the authors, Diffie–Hellman problems are solvable using quantum computers, and a different key exchange scheme resistible to the quantum computer‐based cryptanalysis is discussed.…”
Section: Comparison and Interrelatedness With Other Studies And Metmentioning
confidence: 99%
“…The research of Gupta and Biswas [29] deals with the novel and efficient lattice‐based authenticated key exchange protocol in Canetti‐Krawczyk model. According to the authors, Diffie–Hellman problems are solvable using quantum computers, and a different key exchange scheme resistible to the quantum computer‐based cryptanalysis is discussed.…”
Section: Comparison and Interrelatedness With Other Studies And Metmentioning
confidence: 99%
“…Several cryptographic primitives have tight security construction, such as public‐key encryption [4, 6, 8, 13 ], identity‐based encryption [9, 17 ], and signature scheme [5, 7, 18 ]. Unfortunately, most of the existing AKE protocols such as [10–12, 19–23 ] do not consider tight security. To achieve tight security, Bader et al 's protocol [4 ] used multi‐user secure KEM and multi‐user secure signature scheme as building blocks, and has a three‐pass execution.…”
Section: Introductionmentioning
confidence: 99%
“…Actually, network users are facing the increasing security problems such as the replay attack, the impersonation attack, and privacy disclosure, for the lack of a reliable authentication and privacy protection mechanism with very large possibility. Authentication and key agreement protocols, as the basic cryptographic method, can be used to deal with these security problems, and various related schemes such as in previous works [1][2][3][4] have been presented for different applications using different techniques. Therefore, developing a reliable and privacy-preserving authenticated key agreement (AKA) protocol to ensure the security of mobile communications is a very important issue.…”
Section: Introductionmentioning
confidence: 99%