• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link

Related Topics

  • Key Exchange Protocol
  • Key Exchange Protocol
  • Authenticated Key Exchange
  • Authenticated Key Exchange
  • Exchange Protocol
  • Exchange Protocol
  • Key Protocol
  • Key Protocol
  • Key Agreement
  • Key Agreement
  • Establishment Protocol
  • Establishment Protocol
  • Key Authentication
  • Key Authentication
  • Session Key
  • Session Key

Articles published on Key exchange

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
3496 Search results
Sort by
Recency
  • New
  • Research Article
  • 10.1016/j.jisa.2025.104288
Multi-party post-quantum key exchange schemes
  • Dec 1, 2025
  • Journal of Information Security and Applications
  • Xuejun Fan + 2 more

Multi-party post-quantum key exchange schemes

  • New
  • Research Article
  • 10.1016/j.compeleceng.2025.110750
Security analysis and designing unilateral and bilateral two party ideal-lattice based authenticated key establishment protocol for anonymous mobile communication
  • Dec 1, 2025
  • Computers and Electrical Engineering
  • Mani R + 3 more

Security analysis and designing unilateral and bilateral two party ideal-lattice based authenticated key establishment protocol for anonymous mobile communication

  • New
  • Research Article
  • 10.1088/1361-6463/ae233c
Kinetic modeling of nanosecond repetitively pulsed discharges in CO 2 : insights for reactor design
  • Nov 24, 2025
  • Journal of Physics D: Applied Physics
  • Lanie Mckinney + 3 more

Abstract Plasma-based CO 2 conversion is an emerging power-to-X technology, with the potential to recycle carbon emissions on Earth and produce fuel and life support consumables in-situ for the human exploration of Mars. In this work, we present a 0D chemical kinetic modeling framework using ZDPlasKin to simulate nanosecond repetitively pulsed (NRP) discharges in pure CO 2 , enabling systematic exploration of reactor performance across pressure, temperature, and pulse repetition frequency conditions relevant for integrated systems. A reduced chemical mechanism tailored for NRP discharges enabled long-timescale simulations (1–10s) while still capturing key vibrational energy exchanges. The results of the simulations link the temporal dynamics between pulse and interpulse chemistry to the overall reactor performance. At atmospheric pressure, increasing the pulse repetition frequency reduces CO recombination between pulses and improves conversion without an energy efficiency penalty. Conversion reaches saturation when the overall rate of CO production during the pulse is equal to the rate of CO recombination between pulses. Higher temperatures, which may be required for membrane-based oxygen separation, increase recombination rates and result in lower saturation values of conversion compared to lower temperatures. Additionally, small changes in the maximum reduced electric field strength, influencing total energy coupling, have a strong influence on conversion and efficiency. At low pressures, recombination is negligible, and conversion scales linearly with frequency. These results inform strategies for co-optimizing plasma operating conditions, supporting the engineering and design of CO 2 plasma reactors for both terrestrial and space-based applications.

  • New
  • Research Article
  • 10.1002/spy2.70129
A Quantum‐Resilient and Adaptive Privacy Framework With Anonymization Techniques for Secure Data Mining Operations
  • Nov 24, 2025
  • SECURITY AND PRIVACY
  • N Thanu Priya + 1 more

ABSTRACT The increasing reliance on data mining for extracting valuable insights has raised significant concerns about data security and privacy, especially with evolving cyber threats and the advent of quantum computing. Traditional security frameworks often depend on static encryption mechanisms that are vulnerable to quantum attacks and lack adaptability to emerging threats. To address these limitations, this research introduces the Quantum‐Resilient and Adaptive Privacy (QRAP) framework, which integrates Federated Learning (FL), Quantum‐Resistant Cryptography (QRC), and Anonymization Techniques to enhance security, privacy, and efficiency in data mining operations. Quantum‐Resilient refers to the framework's integration of cryptographic protocols that remain secure under known quantum algorithms (e.g., Grover's and Shor's), particularly using post‐quantum signature schemes and secure key exchange mechanisms. QRAP dynamically updates cryptographic protocols, ensuring resilience against evolving cyber threats, while FL enables secure, decentralized data collaboration without exposing raw data. Additionally, advanced Anonymization Techniques such as Differential Privacy, k‐Anonymity, l‐Diversity, and t‐Closeness further enhance privacy by preventing sensitive data from being re‐identified, ensuring compliance with stringent data protection regulations. Compared to traditional encryption‐based frameworks, QRAP offers a dynamic and quantum‐resilient approach, effectively mitigating vulnerabilities in centralized data mining operations. Experimental results demonstrate that QRAP achieves a 35% enhancement in privacy preservation and a 28% reduction in computational overhead, outperforming existing solutions in protecting sensitive information within dynamic data environments. These findings underscore QRAP's potential to revolutionize secure data mining by providing a scalable, privacy‐preserving, and future‐proof framework. Future research will focus on real‐time optimization of QRAP and its integration with blockchain for enhanced transparency, security, and trust in decentralized data operations.

  • New
  • Research Article
  • 10.1007/s11128-025-05003-1
Adaptive multi-party quantum key exchange in dynamic networks using GHZ states
  • Nov 24, 2025
  • Quantum Information Processing
  • Chaonan Wang + 3 more

Adaptive multi-party quantum key exchange in dynamic networks using GHZ states

  • New
  • Research Article
  • 10.1038/s41598-025-23592-w
Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support
  • Nov 14, 2025
  • Scientific Reports
  • He Zhiqiang + 5 more

Ensuring digital image security is critical in today’s edge computing and networked communication environments. Chaotic systems offer powerful tools for lightweight, real-time encryption, but often suffer from limited chaotic ranges and weak key sensitivity. This paper introduces a robust nonlinear RN chaotic system, combining two chaotic maps to enhance unpredictability and expand the chaotic interval. A fast image encryption scheme is then developed by integrating this system with elliptic-curve Diffie–Hellman (ECDH) key exchange, hierarchical key derivation (HKDF), and dynamic chaotic S-box generation. The scheme ensures plaintext-independent key generation, authentication via ECDSA, and integrity through HMAC-SHA256, thereby preventing man-in-the-middle attacks and key leakage. Using the same set of security keys, this algorithm can produce a completely different encrypted image each time it is applied to the same original image. The proposed technique consistently achieves near-ideal entropy levels (~ 7.999), high NPCR (> 99.61%), and UACI above 32%, image complexity (with a keyspace equal to 10256), and resistance to security attacks, demonstrating outstanding sensitivity and randomness. The low PSNR values and limited correlation of the encrypted images further show strong resilience to statistical and differential assaults. The proposed approach outperforms existing methods in terms of computational reliability, encryption strength, and unpredictability. This work provides a dependable, portable, and efficient solution for secure image transfer in surveillance and multimedia applications.

  • Research Article
  • 10.58496/adsa/2025/017
A Quantum Resilient Security System for Smart Power Grid Data: Combining Kyber, FALCON, and Zero-Knowledge Proofs Against Quantum Threats
  • Nov 7, 2025
  • Applied Data Science and Analysis
  • Mishall Al-Zubaidie + 1 more

The rapid progress of quantum computing poses significant challenges to traditional cryptographic mechanisms, necessitating the adoption of post-quantum cryptography (PQC) solutions. This paper proposes a Quantum-Enhanced Security for Smart Meters (QESM) system to protect power plant data in smart cities, integrating Kyber for secure key exchange, FALCON (Fast-Fourier Transform over Lattice-based Cryptography) for quantum-resistant digital signatures, and ZKP (Zero-Knowledge Proof) for effective verification without revealing sensitive data to secure power plant data against quantum attacks. To evaluate the security of the proposed system, we analyze its resistance to various quantum threats, including Shor’s algorithm, Grover’s algorithm, quantum key analysis, quantum reversal encryption, quantum amplification, quantum switching, and quantum collision attacks. In the current study, accurate measures were used and the average was approximately 7.065 (bits/byte) for randomness, the average execution time was 6.202 milliseconds, the average memory consumption was approximately 4.343 KB, 6.4 Completeness was equal to 1 and unforgeability was 100%. As for the average throughput, it was approximately 485,605 operations per second. That shows the QESM system provides strong security and efficiency, making it a viable solution for protecting the electricity infrastructure in smart cities in the quantum era.

  • Research Article
  • 10.1080/10942912.2025.2559056
Improve the authentication of agricultural food supply chain using Permutations Supersonic Ligero Elliptic Signature Algorithm
  • Nov 5, 2025
  • International Journal of Food Properties
  • Madhuri Sadashiv Arade + 1 more

ABSTRACT Blockchain technology improves transparency and security in agricultural food supply chains (FSC) but faces challenges related to data privacy and emerging computational threats. These issues limit the efficiency and security of permissioned blockchain systems. To address these, a novel cryptographic framework, Permutations Supersonic Ligero Elliptic eXtended Merkle Curve Digital Signature Algorithm, is proposed. In permissioned blockchain-based FSC, metadata exposure and cross-entity data aggregation create privacy risks, allowing adversaries to infer sensitive operational insights by analyzing transaction patterns and correlating data fragments across entities. To mitigate this, the Permutations Supersonic Ligero Fractal (PSLF) is introduced, which ensures transparent, scalable, and compact proof generation, while preserving metadata privacy and preventing adversaries from reconstructing sensitive insights. Also enforces privacy-preserving protocols to limit data exposure across multiple participants and prevent leakage. Additionally, quantum threats, specifically through Shor’s algorithm, threaten the security of cryptographic systems used in FSC. To counter this, the Elliptic eXtended Merkle Curve Digital Signature Algorithm (EXMC-DSA) is presented, which combines quantum-resistant key exchange and signature schemes, ensuring robust security against quantum attacks. This hybrid cryptographic approach ensures both current efficiency and future-proof resilience. As a result, the proposed model outperforms the existing methods in terms of low execution time, low proof generation, and verification time.

  • Research Article
  • 10.53360/2788-7995-2025-3(19)-3
MODIFICATION OF THE LIGHTWEIGHT STREAM CIPHER ALGORITHM CHACHA20
  • Nov 3, 2025
  • Bulletin of Shakarim University. Technical Sciences
  • M A Bakyt + 4 more

Providing secure and high-speed data transmission for low-orbit aircraft (LOA) is a priority in today's world. The objective of this study is to modify existing encryption methods for LOA to overcome the disadvantages in speed and vulnerability to emerging cyber-attacks, including quantum ones. The main idea is to develop a hybrid approach combining an optimized lightweight stream cipher ChaCha20 with a quantum key distribution protocol BB84. This will provide high encryption speed and information-theoretic key exchange security, which is invulnerable to quantum attacks. The research methodology includes the analysis of existing cryptographic solutions, performance modeling of the proposed hybrid algorithm, and the integration of machine learning-based anomaly detection mechanisms (LSTM) to improve the robustness of the system. The main results show that the proposed method significantly improves throughput, reduces latency and power consumption compared to traditional approaches, while providing resilience to current and future threats. The value of the work lies in contributing to the development of post-quantum cryptography for the aerospace industry and creating a basis for the development of more secure and efficient NOLA communication systems, which has direct practical implications for environmental monitoring, precision agriculture and national security.

  • Research Article
  • 10.1145/3774642
Password-Authenticated Key Exchange Protocols: A Survey
  • Nov 3, 2025
  • ACM Computing Surveys
  • Ding Wang + 2 more

Password-authenticated key exchange (PAKE) protocols tackle the important problem of how to enable two parties, who share a low-entropy password, to establish a cryptographically strong session key for secure data communication. Although considerable research efforts have been devoted to designing hundreds of PAKE protocols, to the best of our knowledge, there have been few systematic reviews. In this work, we provide a comprehensive overview of PAKE research. We first propose a list of 13 desirable properties of PAKE protocols in terms of security and usability, enabling PAKE protocols to be systematically rated across a common spectrum. We then provide a taxonomy for PAKE protocols, and classify them into seven types according to their underlying design strategies. For each type, we investigate the inner working mechanisms of various representative protocols, and identify their pros, and cons. We further classify existing PAKE protocols from five other key perspectives (i.e., symmetry, number of participants, hardness assumptions, security goals, and round complexity) and review their development history under each classification, aiming to provide an in-depth and thorough understanding of the status quo of PAKE research. Based on 13 properties and six perspectives, we conduct a large-scale comparative evaluation of 71 representative PAKE protocols in a systematic manner. Finally, we highlight a few potential directions for the future design of PAKE protocols.

  • Research Article
  • 10.1016/j.sysarc.2025.103542
Multi-factor single-registration authentication and key exchange protocol for IIoT
  • Nov 1, 2025
  • Journal of Systems Architecture
  • Hao Xiao + 5 more

Multi-factor single-registration authentication and key exchange protocol for IIoT

  • Research Article
  • 10.1002/spy2.70131
A Lightweight and Secure Authentication Protocol With Blockchain‐Bound Device Tokens for Mobile Roaming in Edge Networks
  • Nov 1, 2025
  • SECURITY AND PRIVACY
  • Suprith Kumar K S + 3 more

ABSTRACT Lightweight and secure authentication is a fundamental requirement for mobile roaming in edge‐assisted networks, particularly in the presence of resource constraints and the emerging threat of quantum‐capable adversaries. This paper proposes a blockchain‐assisted authentication protocol that employs post‐quantum cryptographic primitives to generate and validate device‐bound tokens. During registration, a Home Agent (HA) issues blockchain‐anchored tokens containing signed security metadata and a freshness counter to prevent replay attacks. In roaming scenarios, the Mobile User (MU) selectively discloses token metadata to the Foreign Agent (FA), which verifies its authenticity with the HA to enable efficient and trustworthy authentication. A hybrid key establishment using post‐quantum key encapsulation ensures forward secrecy and quantum‐resistant confidentiality. Formal verification through BAN logic reasoning and automated analysis using the Scyther tool confirm that the protocol withstands impersonation, replay, and man‐in‐the‐middle attacks. Experimental evaluation on mobile devices demonstrates low computational and communication overhead, showing that the protocol is practical and well‐suited for real‐world deployment in edge‐assisted mobility environments.

  • Research Article
  • 10.1016/j.micpro.2025.105205
IHKEM: A post-quantum ready hierarchical key establishment and management scheme for wireless sensor networks
  • Nov 1, 2025
  • Microprocessors and Microsystems
  • Khushboo Jain + 1 more

IHKEM: A post-quantum ready hierarchical key establishment and management scheme for wireless sensor networks

  • Research Article
  • 10.5604/01.3001.0055.2521
Review of modern digital technologies for sustainable buildings: integration of BIM, Digital Twin and renewable energy sources
  • Oct 31, 2025
  • Inżynieria i Budownictwo
  • Anna Stefańska + 1 more

In the face of increasing Polish and EU requirements for climate neutrality, the role of digital technologies in the design and operation of buildings is gaining strategic importance. This paper presents the integrated use of Building Information Modelling (BIM) and the Digital Twin concept in the context of selecting, modelling, and optimizing renewable energy sources (RES) in architectural structures. The analysis covers: (1) key tools and data exchange formats, (2) capabilities for dynamic simulations of energy consumption and production, and (3) the impact of digital twins on predictive management of PV installations, heat pumps, and micro wind turbines. A case study demonstrates the potential for a 32% reduction in CO2 emissions over five years through the integration of BIM and Digital Twin. The results indicate that the synergistic use of both technologies reduces the time required for RES scenario analysis by half and increases the accuracy of energy production forecasts by 15%. The paper concludes with recommendations for designers, investors, and researchers, emphasizing the need for tool interoperability and standardization of energy data.

  • Research Article
  • 10.1038/s41598-025-21861-2
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security
  • Oct 30, 2025
  • Scientific Reports
  • Aman Kumar + 3 more

The rapid evolution of fifth-generation (5G) and beyond (B5G) networks has introduced significant security challenges, necessitating advanced cryptographic mechanisms to protect sensitive data during transmission. Traditional encryption models often struggle to balance security, computational efficiency, and adaptability to dynamic network conditions. This study proposes a novel hybrid cryptographic framework integrating the Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Rivest–Shamir–Adleman (RSA) algorithms. AES and DES provide high-speed symmetric encryption for efficient data protection, while RSA enables secure key exchange and authentication. The integration of dynamic round keys enhances encryption complexity, improving resistance to cryptanalytic attacks. Performance evaluations, including encryption and decryption time analysis, data expansion metrics, and throughput assessments, demonstrate that the proposed framework achieves an optimal balance between security and computational overhead. Benchmark comparisons with traditional and post-quantum cryptographic models highlight the superior efficiency and reduced data expansion of the hybrid approach. Furthermore, practical implementation on ESP32 hardware confirms the model’s feasibility for real-time encryption in resource-constrained environments typical of 5G applications. This scalable and flexible encryption paradigm addresses current and emerging security requirements in high-speed wireless networks, with future work focusing on integration with quantum-resistant cryptographic mechanisms to enhance resilience against evolving cyber threats. Experimental results show that the hybrid model achieves up to 30% higher throughput, 10–15% lower data expansion, and reduced encryption/decryption time compared to baseline algorithms, with successful ESP32 implementation and 100% decryption accuracy for key sizes up to 128 bits.

  • Research Article
  • 10.1007/s00037-025-00271-w
Quantum Automating TC0-Frege Is LWE-Hard
  • Oct 27, 2025
  • computational complexity
  • Noel Arteche + 2 more

Abstract We prove the first hardness results against efficient proof search by quantum algorithms. We show that under Learning with Errors (LWE), the standard lattice-based cryptographic assumption, no quantum algorithm can weakly automate $${\rm TC}^0$$ TC 0 -Frege. This extends the line of results of Krajííček and Pudlík( Information and Computation , 1998), Bonet, Pitassi, and Raz ( SIAM Journal on Computing , 2000),and Bonet, Domingo, Gavaldá, Maciel, and Pitassi ( Computational Complexity, 2004 ), who showed that ExtendedFrege, $${\rm TC}^0$$ TC 0 -Frege and $${\rm AC}^0$$ AC 0 -Frege, respectively, cannot be weakly automated by classical algorithms if either the RSA cryptosystem or the Diffie-Hellman key exchange protocol are secure. To the best of our knowledge, this is the first interaction between quantum computation and propositional proof search.

  • Research Article
  • 10.3390/electronics14214167
Mutual V2I Multifactor Authentication Using PUFs in an Unsecure Multi-Hop Wi-Fi Environment
  • Oct 24, 2025
  • Electronics
  • Mohamed K Elhadad + 1 more

Secure authentication in vehicular ad hoc networks (VANETs) remains a fundamental challenge due to their dynamic topology, susceptibility to attacks, and scalability constraints in multi-hop communication. Existing approaches based on elliptic curve cryptography (ECC), blockchain, and fog computing have achieved partial success but suffer from latency, resource overhead, and limited adaptability, leaving a gap for lightweight and hardware-rooted trust models. To address this, we propose a multi-hop mutual authentication protocol leveraging Physical Unclonable Functions (PUFs), which provide tamper-evident, device-specific responses for cryptographic key generation. Our design introduces a structured sequence of phases, including pre-deployment, registration, login, authentication, key establishment, and session maintenance, with optional multi-hop extension through relay vehicles. Unlike prior schemes, our protocol integrates fuzzy extractors for error tolerance, employs both inductive and game-based proofs for security guarantees, and maps BAN-logic reasoning to specific attack resistances, ensuring robustness against replay, impersonation, and man-in-the-middle attacks. The protocol achieves mutual trust between vehicles and RSUs while preserving anonymity via temporary identifiers and achieving forward secrecy through non-reused CRPs. Conceptual comparison with state-of-the-art PUF-based and non-PUF schemes highlights the potential for reduced latency, lower communication overhead, and improved scalability via cloud-assisted CRP lifecycle management, while pointing to the need for future empirical validation through simulation and prototyping. This work not only provides a secure and efficient solution for VANET authentication but also advances the field by offering the first integrated taxonomy-driven evaluation of PUF-enabled V2X protocols in multi-hop Wi-Fi environments.

  • Research Article
  • 10.1038/s41598-025-20773-5
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol.
  • Oct 22, 2025
  • Scientific reports
  • Seble Bete + 4 more

Ensuring secure data transmission over public channels remains a fundamental challenge in modern communication systems. Cryptography, through encryption and decryption processes, is vital for protecting sensitive information from unauthorized access. Various symmetric and asymmetric cryptographic algorithms are used for this purpose, including Caesar, Affine, Vigenère, Hill ciphers, DES, AES, elliptic curve cryptography, ElGamal, and RSA. Among them, the Affine cipher is a monoalphabetic substitution cipher designed to convert plaintext into unreadable ciphertext to prevent intrusion. Although modified versions of the Affine cipher-such as those incorporating digraph transformation and squared modulus-have attempted to enhance security, they continue to suffer from vulnerabilities such as insecure key exchange, predictable ciphertext patterns, and padding-related ambiguities, especially with odd-length plaintexts. To overcome these limitations, we propose an enhanced Affine cipher algorithm that integrates a digraph transformation and a modified three-pass protocol for secure key exchange. This approach eliminates the need for padding characters, supports encryption of odd-length messages, expands the key space, and significantly improves overall security. We evaluated our method against both the original and modified Affine ciphers using key metrics including the avalanche effect, confusion and diffusion properties, encryption/decryption time, and resistance to brute-force and frequency analysis attacks. Our proposed method achieved a 75% avalanche effect, demonstrated better confusion and diffusion, and showed superior resistance to common cryptanalysis techniques. It also ensured secure key exchange between sender and receiver using the modified three-pass protocol and avoided padding, thereby reducing memory usage and processing time while resolving ciphertext ambiguity. Overall, the enhanced Affine cipher significantly outperforms existing approaches in both security and efficiency, and future work may focus on extending its application to multimedia data and further optimizing its computational performance.

  • Research Article
  • 10.52152/4t8zxq68
QUANTUM-RESILIENT CRYPTOGRAPHIC PROTOCOLS FOR SECURE MULTI-PARTY COMPUTATION IN POST-QUANTUM NETWORKS
  • Oct 19, 2025
  • Lex localis - Journal of Local Self-Government
  • Dr.S Venkatesan + 4 more

The advent of quantum computing presents a paradigm shift in modern cybersecurity, threatening the foundations of classical cryptographic systems such as RSA, ECC, and Diffie–Hellman key exchange. Quantum algorithms like Shor’s and Grover’s can efficiently break these schemes, rendering existing encryption mechanisms vulnerable and obsolete. This growing risk necessitates the development of quantum-resilient or post-quantum cryptographic (PQC) solutions that can safeguard data and computation in the era of quantum networks. Secure Multi-Party Computation (SMPC), a cornerstone of privacy-preserving computation, enables multiple entities to jointly compute a function over their private inputs without revealing them. However, its traditional security assumptions are also undermined by quantum threats. This research aims to explore and evaluate quantum-safe cryptographic protocols for integrating PQC into SMPC frameworks, thereby ensuring both confidentiality and correctness even in the presence of quantum-capable adversaries. The study focuses on lattice-based, hash-based, and code-based cryptographic primitives, analyzing their resilience, efficiency, and scalability when applied to distributed systems. A comparative framework is proposed to assess the performance and security trade-offs of different post-quantum SMPC implementations under realistic network conditions. The findings are expected to contribute to the design of a new class of cryptographic protocols capable of resisting quantum attacks, supporting the secure functioning of next-generation networks, and guiding policymakers and technologists toward practical post-quantum standardization. Ultimately, this research strengthens the bridge between theoretical cryptography and real-world cybersecurity readiness in the post-quantum era.

  • Research Article
  • 10.3390/fi17100472
Security Analysis and Designing Advanced Two-Party Lattice-Based Authenticated Key Establishment and Key Transport Protocols for Mobile Communication
  • Oct 16, 2025
  • Future Internet
  • Mani Rajendran + 3 more

In this paper, we have proposed a two-party authenticated key establishment (AKE), and authenticated key transport protocols based on lattice-based cryptography, aiming to provide security against quantum attacks for secure communication. This protocol enables two parties, who may share long-term public keys, to securely establish a shared session key, and transportation of the session key from the server while achieving mutual authentication. Our construction leverages the hardness of lattice problems Ring Learning With Errors (Ring-LWE), ensuring robustness against quantum and classical adversaries. Unlike traditional schemes whose security depends upon number-theoretic assumptions being vulnerable to quantum attacks, our protocol ensures security in the post-quantum era. The proposed protocol ensures forward secrecy, and provides security even if the long-term key is compromised. This protocol also provides essential property key freshness and resistance against man-in-the-middle attacks, impersonation attacks, replay attacks, and key mismatch attacks. On the other hand, the proposed key transport protocol provides essential property key freshness, anonymity, and resistance against man-in-the-middle attacks, impersonation attacks, replay attacks, and key mismatch attacks. A two-party key transport protocol is a cryptographic protocol in which one party (typically a trusted key distribution center or sender) securely generates and sends a session key to another party. Unlike key exchange protocols (where both parties contribute to key generation), key transport protocols rely on one party to generate the key and deliver it securely. The protocol possesses a minimum number of exchanged messages and can reduce the number of communication rounds to help minimize the communication overhead.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers