2021
DOI: 10.1016/j.jisa.2021.103026
|View full text |Cite
|
Sign up to set email alerts
|

PB-3PAKA: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(21 citation statements)
references
References 21 publications
0
21
0
Order By: Relevance
“…Recently, Islam and Basu [24] developed an authenticated key exchange system for mobile devices in which a server facilitates the establishment of a session key between two parties. Through the help of a reliable party, users who want to communicate first check in to a server using their password, from there the session key is formed between users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Islam and Basu [24] developed an authenticated key exchange system for mobile devices in which a server facilitates the establishment of a session key between two parties. Through the help of a reliable party, users who want to communicate first check in to a server using their password, from there the session key is formed between users.…”
Section: Related Workmentioning
confidence: 99%
“…A review of many three-party authenticated key agreement systems has shown that very few of them are resistant to quantum computing. As the first attempt to provide a three-party authenticated key agreement mechanism for this purpose is the protocol by Islam et al [24]. But, the approach proposed by him is vulnerable to several threats, including password guessing, smartcard theft, impersonation, and compromises of user anonymity and traceability also their scheme takes maximum number (6 times) of message exchange in authentication and key agreement phase.…”
Section: Motivationmentioning
confidence: 99%
“…The parameters are chosen based on Ding, Cheng & Qin (2022) and the reconciliation’s upper limit. The calculation model of Islam & Basu (2021) is used to obtain the running time comparison results of Ding, Cheng & Qin (2022) and the BiGISIS.PAKE schemes. In Ding, Cheng & Qin (2022) , Sony Xperia XP with Qualcomm MSM8996 1.5 GHz CPU and 3 GB RAM was used for m´.…”
Section: Comparisonmentioning
confidence: 99%
“…The security analysis of the proposed PAKE, which provides key reusability, anonymity, and PFS, was performed in the RoR model by examining attack resistance such as PDA, SLA, and MBA. In Islam & Basu (2021) , a three-party and four-phase lattice-based PAKE scheme for mobile devices was proposed. Based on the hardness of the RLWE problem, the authentication was obtained using a timestamp and password.…”
Section: Introductionmentioning
confidence: 99%
“…An improved version of Dabra, Bala & Kumari (2020) with a practical randomized KE approach is proposed in Ding, Cheng & Qin (2022) to capture signal leakage attack resistance. In Islam & Basu (2021) , a four-phase RLWE-based PAKE was constructed for two mobile devices-one server communication model. The security-related examinations were done by following ROM definitions.…”
Section: Introductionmentioning
confidence: 99%