About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings

Research Article

Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-30623-5_3,
        author={Jinhua Wang and Ting Chen and Yanyan Liu and Yu Zhou and XinFeng Dong},
        title={Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice},
        proceedings={Security and Privacy in New Computing Environments. 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings},
        proceedings_a={SPNCE},
        year={2023},
        month={4},
        keywords={Post-quantum Key Agreement Identity-based Signature MLWE Peikert’s reconciliation mechanism},
        doi={10.1007/978-3-031-30623-5_3}
    }
    
  • Jinhua Wang
    Ting Chen
    Yanyan Liu
    Yu Zhou
    XinFeng Dong
    Year: 2023
    Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice
    SPNCE
    Springer
    DOI: 10.1007/978-3-031-30623-5_3
Jinhua Wang1,*, Ting Chen1, Yanyan Liu1, Yu Zhou1, XinFeng Dong1
  • 1: Science and Technology on Communication Security Laboratory, Chengdu
*Contact email: wjhcetc@163.com

Abstract

It is crucial and challenging to design a quantum-secure and efficient authentication key agreement scheme for IoT. The reasons are that not only there are various security requirements need to meet, but also communication party is resource-constrained. Recently, a large number of 2PAKA schemes for IoT have been presented, yet most of them are subject to quantum attack. In this paper, we put forward a quantum-secure 2PAKA protocol using lattice cryptography. The proposed LB-ID-2PAKA protocol makes use of identity-based signature to avoid the complicated certificate management of PKI-based protocol. At the same time, based on the Kyber.KE, we apply Peikert’s reconciliation mechanism to save the communication cost. Our LB-ID-2PAKA protocol can be resistance against various attack and provide desired security property, especially support perfect forward secrecy. Moreover, the provable security analysis shows that our LB-ID-2PAKA protocol is provably secure under RO model and the hardness assumption of MLWE.

Keywords
Post-quantum Key Agreement Identity-based Signature MLWE Peikert’s reconciliation mechanism
Published
2023-04-26
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-30623-5_3
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL