{"title":"A Robust Lattice-Based Post-Quantum Three-Party Key Exchange Scheme for Mobile Devices","authors":"Akanksha Singh, Harish Chandra, Saurabh Rana","doi":"10.1002/cpe.70036","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>In this paper, we introduce a lattice-based authenticated three-party key agreement scheme for mobile devices with the aim of achieving both post-quantum security and efficiency. Our scheme is inspired by the authenticated key exchange protocol developed. We revisit the recently suggested system, which is a communication-efficient three-party password-authenticated key exchange, in which we found that the scheme is not fully correct and also demonstrate that the scheme is not safe from user's anonymity and impersonation assaults. We provide an enhanced scheme that is both effective and resistant to the mentioned assault. We also demonstrate its security in a ROM (Random Oracle Model). A comparison analysis that includes performance, security evaluations, energy consumption, and packet loss rate is also provided, proving the suitability of the suggested design.</p>\n </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 6-8","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrency and Computation-Practice & Experience","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/cpe.70036","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we introduce a lattice-based authenticated three-party key agreement scheme for mobile devices with the aim of achieving both post-quantum security and efficiency. Our scheme is inspired by the authenticated key exchange protocol developed. We revisit the recently suggested system, which is a communication-efficient three-party password-authenticated key exchange, in which we found that the scheme is not fully correct and also demonstrate that the scheme is not safe from user's anonymity and impersonation assaults. We provide an enhanced scheme that is both effective and resistant to the mentioned assault. We also demonstrate its security in a ROM (Random Oracle Model). A comparison analysis that includes performance, security evaluations, energy consumption, and packet loss rate is also provided, proving the suitability of the suggested design.
期刊介绍:
Concurrency and Computation: Practice and Experience (CCPE) publishes high-quality, original research papers, and authoritative research review papers, in the overlapping fields of:
Parallel and distributed computing;
High-performance computing;
Computational and data science;
Artificial intelligence and machine learning;
Big data applications, algorithms, and systems;
Network science;
Ontologies and semantics;
Security and privacy;
Cloud/edge/fog computing;
Green computing; and
Quantum computing.