Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2023

24-08-2023

Quantum secure two party authentication protocol for mobile devices

Authors: Bshisht Moony, Amit K. Barnwal, Mrityunjay Singh, Dheerendra Mishra

Published in: Peer-to-Peer Networking and Applications | Issue 5/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to recent advancements in mobile and wireless technologies, many mobile-based applications have received greater attention. Users can use their mobile devices to access various web services via the Internet from any location at any time. Hence, security becomes a critical issue in wireless communications because of the open nature of the network. Over the last two decades, many researchers have proposed various authentication protocols for mobile devices to ensure safe communication. These protocols follow either two party architecture or three party architecture. Most of these protocols are based on discrete logarithms or integer factorization problems, which are solvable in polynomial time algorithms for quantum computers. As a result, authenticated key agreement (AKA) schemes based on factorization and discrete logarithms are not secure in post-quantum environments. Thus, analyzing and designing AKA schemes for the quantum environment is required. We propose two party authenticated key agreement scheme for mobile devices based on ring learning with error problems. The proposed AKA scheme security is based on hard lattice problems. The security of the proposed design is analyzed and proved in the random oracle model. Moreover, performance evaluation and comparative study are also done to understand the proposed design’s usefulness.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332MathSciNetCrossRefMATH Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332MathSciNetCrossRefMATH
2.
go back to reference Chen L, Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner RA, Smith-Tone D (2016) Report on post-quantum cryptography, vol 12. US Department of Commerce, National Institute of Standards and TechnologyCrossRef Chen L, Chen L, Jordan S, Liu YK, Moody D, Peralta R, Perlner RA, Smith-Tone D (2016) Report on post-quantum cryptography, vol 12. US Department of Commerce, National Institute of Standards and TechnologyCrossRef
3.
go back to reference Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549(7671):188–194CrossRef Bernstein DJ, Lange T (2017) Post-quantum cryptography. Nature 549(7671):188–194CrossRef
4.
go back to reference Ayub MF, Shamshad S, Mahmood K, Islam SKH, Parizi RM, Choo KKR (2020) A provably secure two-factor authentication scheme for usb storage devices. IEEE Trans Consum Electron 66(4):396–405CrossRef Ayub MF, Shamshad S, Mahmood K, Islam SKH, Parizi RM, Choo KKR (2020) A provably secure two-factor authentication scheme for usb storage devices. IEEE Trans Consum Electron 66(4):396–405CrossRef
5.
go back to reference Rafique F, Obaidat MS, Mahmood K, Ayub MF, Ferzund J, Chaudhry SA (2022) An efficient and provably secure certificateless protocol for industrial internet of things. IEEE Trans Industr Inf 18(11):8039–8046CrossRef Rafique F, Obaidat MS, Mahmood K, Ayub MF, Ferzund J, Chaudhry SA (2022) An efficient and provably secure certificateless protocol for industrial internet of things. IEEE Trans Industr Inf 18(11):8039–8046CrossRef
6.
go back to reference Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 1–23. Springer Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 1–23. Springer
7.
go back to reference Ding J, Xie X, Lin X (2012) A simple provably secure key exchange scheme based on the learning with errors problem. Cryptology ePrint Archive Ding J, Xie X, Lin X (2012) A simple provably secure key exchange scheme based on the learning with errors problem. Cryptology ePrint Archive
8.
go back to reference Zhang J, Zhang Z, Ding J, Snook M, Dagdelen Ö (2015) Authenticated key exchange from ideal lattices. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 719–751. Springer Zhang J, Zhang Z, Ding J, Snook M, Dagdelen Ö (2015) Authenticated key exchange from ideal lattices. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 719–751. Springer
9.
go back to reference Feng Q, He D, Zeadally S, Kumar N, Liang K (2018) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775–2785CrossRef Feng Q, He D, Zeadally S, Kumar N, Liang K (2018) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775–2785CrossRef
10.
go back to reference Dabra V, Bala A, Kumari S (2020) Lba-pake: Lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Systems Journal Dabra V, Bala A, Kumari S (2020) Lba-pake: Lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Systems Journal
11.
go back to reference Islam SKH (2020) Provably secure two-party authenticated key agreement protocol for post-quantum environments. Journal of Information Security and Applications 52:102468CrossRef Islam SKH (2020) Provably secure two-party authenticated key agreement protocol for post-quantum environments. Journal of Information Security and Applications 52:102468CrossRef
12.
go back to reference Dabra V, Bala A, Kumari S (2021) Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments. Journal of Information Security and Applications 61:102889CrossRef Dabra V, Bala A, Kumari S (2021) Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments. Journal of Information Security and Applications 61:102889CrossRef
13.
go back to reference Ding R, Cheng C, Qin Y (2022) Further analysis and improvements of a lattice-based anonymous pake scheme. IEEE Systems Journal Ding R, Cheng C, Qin Y (2022) Further analysis and improvements of a lattice-based anonymous pake scheme. IEEE Systems Journal
14.
go back to reference He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052–2064CrossRef He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052–2064CrossRef
15.
go back to reference Islam SKH, Obaidat MS, Amin R (2016) An anonymous and provably secure authentication scheme for mobile user. Int J Commun Syst 29(9):1529–1544CrossRef Islam SKH, Obaidat MS, Amin R (2016) An anonymous and provably secure authentication scheme for mobile user. Int J Commun Syst 29(9):1529–1544CrossRef
16.
go back to reference Dharminder D (2021) Lwedm: Learning with error based secure mobile digital rights management system. Transactions on Emerging Telecommunications Technologies 32(2):e4199CrossRef Dharminder D (2021) Lwedm: Learning with error based secure mobile digital rights management system. Transactions on Emerging Telecommunications Technologies 32(2):e4199CrossRef
17.
go back to reference Ren P, Gu X (2022) Practical post-quantum password-authenticated key exchange based-on module-lattice. In Information Security and Cryptology–ICISC 2021: 24th International Conference, Seoul, South Korea, December 1–3, 2021, Revised Selected Papers, pages 137–156. Springer Ren P, Gu X (2022) Practical post-quantum password-authenticated key exchange based-on module-lattice. In Information Security and Cryptology–ICISC 2021: 24th International Conference, Seoul, South Korea, December 1–3, 2021, Revised Selected Papers, pages 137–156. Springer
18.
go back to reference Li Z, Wang D, Morais E (2020) Quantum-safe round-optimal password authentication for mobile devices. IEEE Transactions on Dependable and Secure Computing Li Z, Wang D, Morais E (2020) Quantum-safe round-optimal password authentication for mobile devices. IEEE Transactions on Dependable and Secure Computing
19.
go back to reference Wang Q, Wang D, Cheng C, He D (2021) Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Transactions on Dependable and Secure Computing Wang Q, Wang D, Cheng C, He D (2021) Quantum2fa: efficient quantum-resistant two-factor authentication scheme for mobile devices. IEEE Transactions on Dependable and Secure Computing
20.
go back to reference Dharminder D, Chandran KP (2020) Lwesm: learning with error based secure communication in mobile devices using fuzzy extractor. J Ambient Intell Humaniz Comput 11(10):4089–4100CrossRef Dharminder D, Chandran KP (2020) Lwesm: learning with error based secure communication in mobile devices using fuzzy extractor. J Ambient Intell Humaniz Comput 11(10):4089–4100CrossRef
21.
go back to reference Ding J, Alsayigh S, Lancrenon J, Rv S, Snook M (2017) Provably secure password authenticated key exchange based on rlwe for the post-quantum world. In Cryptographers’ Track at the RSA conference, pages 183–204. Springer Ding J, Alsayigh S, Lancrenon J, Rv S, Snook M (2017) Provably secure password authenticated key exchange based on rlwe for the post-quantum world. In Cryptographers’ Track at the RSA conference, pages 183–204. Springer
22.
go back to reference Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pages 197–206 Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pages 197–206
23.
24.
go back to reference Lyubashevsky V, Peikert C, Regev O (2013) On ideal lattices and learning with errors over rings. Journal of the ACM (JACM) 60(6):1–35MathSciNetCrossRefMATH Lyubashevsky V, Peikert C, Regev O (2013) On ideal lattices and learning with errors over rings. Journal of the ACM (JACM) 60(6):1–35MathSciNetCrossRefMATH
25.
go back to reference Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. Cryptology Eprint Archive Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. Cryptology Eprint Archive
Metadata
Title
Quantum secure two party authentication protocol for mobile devices
Authors
Bshisht Moony
Amit K. Barnwal
Mrityunjay Singh
Dheerendra Mishra
Publication date
24-08-2023
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2023
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01534-5

Other articles of this Issue 5/2023

Peer-to-Peer Networking and Applications 5/2023 Go to the issue

Premium Partner