Mani R. , Dharminder Chaudhary , A. Padmavathi , Cheng-Chi Lee
{"title":"基于单边和双边两方理想格的匿名移动通信认证密钥建立协议的安全性分析与设计","authors":"Mani R. , Dharminder Chaudhary , A. Padmavathi , Cheng-Chi Lee","doi":"10.1016/j.compeleceng.2025.110750","DOIUrl":null,"url":null,"abstract":"<div><div>A two-party authenticated key establishment based on lattices allows two entities to set up a shared secret key securely over a vulnerable transmission medium while ensuring authentication of the participating parties. Given quantum computers promising danger to conventional cryptographic systems, lattice-based protocols utilize quantum-resistant cryptographic primitives (Ring Learning With Error) to provide security guarantees. Many lattice-based authentication key exchange protocols have been designed in the last few years. In this article, the authors have performed a security analysis and they have designed unilateral and bilateral two party ideal-lattice based authenticated key establishment protocols (depending on whether authentication is one-sided (unilateral) or mutual (bilateral), their applications vary) for anonymous mobile communication. In unilateral authentication (HTTPS/TLS 1.3), only one party (typically a server) proves its identity, while the other remains anonymous or does not require explicit authentication. In bilateral authentication (Signal, WhatsApp, Telegram), both parties verify each other’s identities before establishing a secure session. The proposed scheme incorporates forward-secure properties to ensure that even if the long-term key are compromised, the confidentiality of past communication does not hamper. This protocol also provides anonymity, essential for safeguarding individual liberties and preserving confidentiality in sensitive communication scenarios. The protocol possesses a minimum number of exchanged messages and can reduce the number of communication rounds to help minimize the communication overhead.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"128 ","pages":"Article 110750"},"PeriodicalIF":4.9000,"publicationDate":"2025-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security analysis and designing unilateral and bilateral two party ideal-lattice based authenticated key establishment protocol for anonymous mobile communication\",\"authors\":\"Mani R. , Dharminder Chaudhary , A. Padmavathi , Cheng-Chi Lee\",\"doi\":\"10.1016/j.compeleceng.2025.110750\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>A two-party authenticated key establishment based on lattices allows two entities to set up a shared secret key securely over a vulnerable transmission medium while ensuring authentication of the participating parties. Given quantum computers promising danger to conventional cryptographic systems, lattice-based protocols utilize quantum-resistant cryptographic primitives (Ring Learning With Error) to provide security guarantees. Many lattice-based authentication key exchange protocols have been designed in the last few years. In this article, the authors have performed a security analysis and they have designed unilateral and bilateral two party ideal-lattice based authenticated key establishment protocols (depending on whether authentication is one-sided (unilateral) or mutual (bilateral), their applications vary) for anonymous mobile communication. In unilateral authentication (HTTPS/TLS 1.3), only one party (typically a server) proves its identity, while the other remains anonymous or does not require explicit authentication. In bilateral authentication (Signal, WhatsApp, Telegram), both parties verify each other’s identities before establishing a secure session. The proposed scheme incorporates forward-secure properties to ensure that even if the long-term key are compromised, the confidentiality of past communication does not hamper. This protocol also provides anonymity, essential for safeguarding individual liberties and preserving confidentiality in sensitive communication scenarios. The protocol possesses a minimum number of exchanged messages and can reduce the number of communication rounds to help minimize the communication overhead.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"128 \",\"pages\":\"Article 110750\"},\"PeriodicalIF\":4.9000,\"publicationDate\":\"2025-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625006937\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625006937","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Security analysis and designing unilateral and bilateral two party ideal-lattice based authenticated key establishment protocol for anonymous mobile communication
A two-party authenticated key establishment based on lattices allows two entities to set up a shared secret key securely over a vulnerable transmission medium while ensuring authentication of the participating parties. Given quantum computers promising danger to conventional cryptographic systems, lattice-based protocols utilize quantum-resistant cryptographic primitives (Ring Learning With Error) to provide security guarantees. Many lattice-based authentication key exchange protocols have been designed in the last few years. In this article, the authors have performed a security analysis and they have designed unilateral and bilateral two party ideal-lattice based authenticated key establishment protocols (depending on whether authentication is one-sided (unilateral) or mutual (bilateral), their applications vary) for anonymous mobile communication. In unilateral authentication (HTTPS/TLS 1.3), only one party (typically a server) proves its identity, while the other remains anonymous or does not require explicit authentication. In bilateral authentication (Signal, WhatsApp, Telegram), both parties verify each other’s identities before establishing a secure session. The proposed scheme incorporates forward-secure properties to ensure that even if the long-term key are compromised, the confidentiality of past communication does not hamper. This protocol also provides anonymity, essential for safeguarding individual liberties and preserving confidentiality in sensitive communication scenarios. The protocol possesses a minimum number of exchanged messages and can reduce the number of communication rounds to help minimize the communication overhead.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.