
Research Article
Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice
@INPROCEEDINGS{10.1007/978-3-031-30623-5_3, author={Jinhua Wang and Ting Chen and Yanyan Liu and Yu Zhou and XinFeng Dong}, title={Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice}, proceedings={Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings}, proceedings_a={SPNCE}, year={2023}, month={4}, keywords={Post-quantum Key Agreement Identity-based Signature MLWE Peikert’s reconciliation mechanism}, doi={10.1007/978-3-031-30623-5_3} }
- Jinhua Wang
Ting Chen
Yanyan Liu
Yu Zhou
XinFeng Dong
Year: 2023
Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice
SPNCE
Springer
DOI: 10.1007/978-3-031-30623-5_3
Abstract
It is crucial and challenging to design a quantum-secure and efficient authentication key agreement scheme for IoT. The reasons are that not only there are various security requirements need to meet, but also communication party is resource-constrained. Recently, a large number of 2PAKA schemes for IoT have been presented, yet most of them are subject to quantum attack. In this paper, we put forward a quantum-secure 2PAKA protocol using lattice cryptography. The proposed LB-ID-2PAKA protocol makes use of identity-based signature to avoid the complicated certificate management of PKI-based protocol. At the same time, based on the Kyber.KE, we apply Peikert’s reconciliation mechanism to save the communication cost. Our LB-ID-2PAKA protocol can be resistance against various attack and provide desired security property, especially support perfect forward secrecy. Moreover, the provable security analysis shows that our LB-ID-2PAKA protocol is provably secure under RO model and the hardness assumption of MLWE.