Three-party password authenticated key agreement protocol with user anonymity based on lattice
With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were p...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018021/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539443242041344 |
---|---|
author | Caifen WANG Li CHEN |
author_facet | Caifen WANG Li CHEN |
author_sort | Caifen WANG |
collection | DOAJ |
description | With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication. |
format | Article |
id | doaj-art-948a850dd21040d98fa61b97b165ecac |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-948a850dd21040d98fa61b97b165ecac2025-01-14T07:14:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-02-0139213059716355Three-party password authenticated key agreement protocol with user anonymity based on latticeCaifen WANGLi CHENWith the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018021/lattice-based cryptologyprovably securepassword authenticationkey exchangering-learning-with-error |
spellingShingle | Caifen WANG Li CHEN Three-party password authenticated key agreement protocol with user anonymity based on lattice Tongxin xuebao lattice-based cryptology provably secure password authentication key exchange ring-learning-with-error |
title | Three-party password authenticated key agreement protocol with user anonymity based on lattice |
title_full | Three-party password authenticated key agreement protocol with user anonymity based on lattice |
title_fullStr | Three-party password authenticated key agreement protocol with user anonymity based on lattice |
title_full_unstemmed | Three-party password authenticated key agreement protocol with user anonymity based on lattice |
title_short | Three-party password authenticated key agreement protocol with user anonymity based on lattice |
title_sort | three party password authenticated key agreement protocol with user anonymity based on lattice |
topic | lattice-based cryptology provably secure password authentication key exchange ring-learning-with-error |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018021/ |
work_keys_str_mv | AT caifenwang threepartypasswordauthenticatedkeyagreementprotocolwithuseranonymitybasedonlattice AT lichen threepartypasswordauthenticatedkeyagreementprotocolwithuseranonymitybasedonlattice |