Post‐quantum identity‐based authenticated multiple key agreement protocol
نویسندگان
چکیده
Authenticated multiple key agreement (AMKA) protocols provide participants with session keys after one round of authentication. Many schemes use Diffie–Hellman or authenticated that rely on hard integer factorizations are vulnerable to quantum algorithms. Lattice cryptography provides resistance protocols, but the certificate always incurs excessive public infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed removes this To answer need, we two-party lattice- and identity-based AMKA scheme based bilateral short computational inhomogeneous small solutions, security proof random oracle model. Compared existing our new protocol has higher efficiency stronger security.
منابع مشابه
Improved Yen-Joye’s Authenticated Multiple-key Agreement Protocol∗
In this article, we propose an authenticated multiple-key agreement protocol. The protocol not only secure to against the unknown-key attack but also more efficient than the other protocols.
متن کاملChameleon-Based Deniable Authenticated Key Agreement Protocol
As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...
متن کاملA Robust Authenticated Key Agreement Protocol
In this paper, we propose a robust authenticated key agreement protocol in which two communication parties exchange a secret session key and authenticate each other. The protocol can be considered as an improvement of simple authenticated key agreement algorithm (SAKA). However, our protocol is more significant in that it addresses the problem of the off-line password guessing attack.
متن کاملA New Authenticated Key Agreement Protocol
Authenticated key agreement protocols play a significant role in securing communications over public network channels (Internet). This paper proposes a new key agreement protocol based on factorization problem over nonabelian groups. Then it presents two different ways to provide mutual authentication for the proposed protocol; this paper presents a new authenticated key agreement protocol usin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Etri Journal
سال: 2023
ISSN: ['1225-6463', '2233-7326']
DOI: https://doi.org/10.4218/etrij.2022-0320