2019
DOI: 10.1007/s12652-019-01529-2
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…As an addition to k -anonymity, entropy [19,21,22,25,26] can also measure the extent of privacy protection. The communication framework based on the information theory [27,28] proposed the information entropy model for privacy protection, which refers to the probability that an attacker can identify the real user among other k − 1 users. In general, the attacker can measure the real location by entropy, and the higher the value, the more uncertainty.…”
Section: Location Privacy Metricsmentioning
confidence: 99%
“…As an addition to k -anonymity, entropy [19,21,22,25,26] can also measure the extent of privacy protection. The communication framework based on the information theory [27,28] proposed the information entropy model for privacy protection, which refers to the probability that an attacker can identify the real user among other k − 1 users. In general, the attacker can measure the real location by entropy, and the higher the value, the more uncertainty.…”
Section: Location Privacy Metricsmentioning
confidence: 99%
“…At present, compared with AKE protocols based on traditional problems, the research on the lattice-based AKE protocols is obviously insufficient as well as low computational efficiency, high communication cost, lack of security proof, et al Optimizing the communication rounds of the protocol can reduce both the computational and communication cost and the risk of being attacked, helping to simplify the security analysis. Therefore, reducing the communication rounds of the AKE protocol has always been an important direction of the lattice-based AKE protocols and achieved some results [13][14] [15][16][17] [18].…”
Section: Introductionmentioning
confidence: 99%
“…It is applicable for IoT-related applications that will enter into all critical aspects of connected living and smart environments [7]. The most remarkable example of quantum cryptography is quantum key distribution (QKD) [8] that can transmit the data securely and execute the cryptographic protocol, including quantum mechanics elements. The infrastructure of IoT performance depends on the attention of critical areas in QKD [9].…”
Section: Introductionmentioning
confidence: 99%
“…Network attacks have increased in all the wireless communication channels, especially in IoT gadgets. Li et al [8] described the PQC and Hash Proof System (HPS) that has fascinated the concentration in quantum-resistant verification to reduce the attacks. These HPS structures are generally based on robust security methods that can check the chosen-ciphertext attack (CCA) and focus on single-bit encryption.…”
Section: Introductionmentioning
confidence: 99%