Find in Library
Search millions of books, articles, and more
Indexed Open Access Databases
A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography
oleh: Dharminder Chaudhary, Uddeshaya Kumar, Kashif Saleem
Format: | Article |
---|---|
Diterbitkan: | IEEE 2023-01-01 |
Deskripsi
A three-party authenticated key exchange protocol enables two entities to agree on a session key with the help of a dedicated server over a public channel. Shor’s algorithm is a big threat to existing authenticated key exchange protocols. Lattice based cryptography plays a very important role in designing authentication and key agreements secure against the threat of quantum attacks. However, it is not an easy job to design quantum resistant password based three party protocols due to the high demand for security requirements and the limited resources nature of mobile devices. In this article, we have proposed a new post quantum three party key exchange based on ring learning with errors assumption. This protocol is motivated by Islam et al.’s authenticated key exchange protocol. Their protocol is not secure against stolen smartcard attacks, or password guessing attacks, and can’t provide user anonymity. Anonymous communication is a big requirement for practical applications like e-healthcare services/smart vehicular communication. This paper also contains the performance analysis of the proposed protocol along with other relevant protocols.