Abstract

The recent advancement in quantum computers generates the threat alarm of breaking the security of key exchange protocols, which is based on discrete logarithmic or prime factorization problem in polynomial time. Hence, motivated to develop the key exchange protocol that is secure in the postquantum era, Feng <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al.</i> proposed an anonymous authenticated key exchange protocol for mobile devices in a postquantum world. Although the protocol is simple, elegant, and efficient for mobile devices, but it is vulnerable to signal leakage attack, spoofing attack, manipulation-based attacks, and user anonymity violation attack. Therefore, to overcome the above weaknesses, lattice-based anonymous password authenticated key exchange protocol has been proposed for mobile devices. Further, our protocol supports the key reuse, perfect forward secrecy, and anonymity features. Our formal security proof and implementation results show that the proposed protocol is suitable to be used for real-time security of mobile networks.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.