Post‐quantum identity‐based authenticated multiple key agreement protocol

نویسندگان

چکیده

Authenticated multiple key agreement (AMKA) protocols provide participants with session keys after one round of authentication. Many schemes use Diffie–Hellman or authenticated that rely on hard integer factorizations are vulnerable to quantum algorithms. Lattice cryptography provides resistance protocols, but the certificate always incurs excessive public infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed removes this To answer need, we two-party lattice- and identity-based AMKA scheme based bilateral short computational inhomogeneous small solutions, security proof random oracle model. Compared existing our new protocol has higher efficiency stronger security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Yen-Joye’s Authenticated Multiple-key Agreement Protocol∗

In this article, we propose an authenticated multiple-key agreement protocol. The protocol not only secure to against the unknown-key attack but also more efficient than the other protocols.

متن کامل

Chameleon-Based Deniable Authenticated Key Agreement Protocol

As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...

متن کامل

A Robust Authenticated Key Agreement Protocol

In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.

متن کامل

A New Authenticated Key Agreement Protocol

Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Etri Journal

سال: 2023

ISSN: ['1225-6463', '2233-7326']

DOI: https://doi.org/10.4218/etrij.2022-0320