2022
DOI: 10.1002/ett.4660
|View full text |Cite
|
Sign up to set email alerts
|

A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication

Abstract: Mobile communication is very important for an individual users, enterprisers, industries, businesses, and organizations. Since the nodes communicate through a public channel, security, and privacy become essential component for mobile communication. Both key exchange and authentication are two important security attributes to establish secure communication between two parties. In the past few years, various post‐quantum secure authentication protocols have been designed, but we have found that either some of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Even if the BiGISIS.PAKE has much more arithmetic operations and running time due to the BiP method used for SLA resistance and MSB reconciliation function; it does not require any signal information to obtain the shared key. In Dabra, Bala & Kumari (2020) , Ding, Cheng & Qin, (2022) and Kumar et al (2023) the Ding reconciliation method, defined with Cha() and Mod 2 () functions, was added as a solution of reconciliation problem. In this approach, the idea of sending additional information about the key component was used to generate the shared key.…”
Section: Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Even if the BiGISIS.PAKE has much more arithmetic operations and running time due to the BiP method used for SLA resistance and MSB reconciliation function; it does not require any signal information to obtain the shared key. In Dabra, Bala & Kumari (2020) , Ding, Cheng & Qin, (2022) and Kumar et al (2023) the Ding reconciliation method, defined with Cha() and Mod 2 () functions, was added as a solution of reconciliation problem. In this approach, the idea of sending additional information about the key component was used to generate the shared key.…”
Section: Comparisonmentioning
confidence: 99%
“…SLA and MBA resistances were discussed by considering mobile environment communication. In Kumar et al (2023) , an SLA-resistant PAKE scheme was constructed for mobile devices. The security of the proposed PAKE was based on the RLWE problem.…”
Section: Introductionmentioning
confidence: 99%
“…Figure 2 shows this edge-cloud continuum: deep edge nodes are operating under limited connectivity and low power conditions. Those can be mobile devices supporting fintech applications, autonomous robots in factory environments, or connected cars that operate under similar terms like [18], to name a few examples. However, this does not preclude local processing power for AI processes and establishment of quantum resilient links.…”
Section: Introductionmentioning
confidence: 99%
“…In 2022, Dharminder et al [5] proposed a post quantum reconciliation enabling key exchange for the Internet of Things environment. In 2023, Kumar et al [19] proposed a quantum-safe key agreement based on a variant of ideal lattice assumption, the ring learning errors. This protocol just requires two messages in exchange for an authenticated key agreement.…”
mentioning
confidence: 99%