2020
DOI: 10.33581/1561-4085-2020-23-4-405-413
|View full text |Cite
|
Sign up to set email alerts
|

Post-Quantum Group-Oriented Authentication in IoT

Abstract: The Internet of Things may include sensors, actuators, analyzers, logical controllers, which together form distributed network of heterogeneous devices. Group-based approach to authentication may be relevant when the number of nodes is very large and there are constrained devices among them. Post-quantum schemes as candidates in NIST competition are considered. Lattices are chosen as best candidates for building group-oriented schemes for IoT due to high performance, relatively small key sizes, well researched… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…For the submitted plaintext, the encryption algorithm is used to encrypt the access information to obtain the corresponding ciphertext. The number of decryption queries generated by access is limited [18]. The server selects the proxy service, and the user randomly selects the elements to generate the modified hidden cloud key.…”
Section: Establishment Of Data Security Access Control Model Based On...mentioning
confidence: 99%
“…For the submitted plaintext, the encryption algorithm is used to encrypt the access information to obtain the corresponding ciphertext. The number of decryption queries generated by access is limited [18]. The server selects the proxy service, and the user randomly selects the elements to generate the modified hidden cloud key.…”
Section: Establishment Of Data Security Access Control Model Based On...mentioning
confidence: 99%