Next Article in Journal
CTDD-YOLO: A Lightweight Detection Algorithm for Tiny Defects on Tile Surfaces
Previous Article in Journal
A Control Strategy for Suppressing Zero-Crossing Current of Single-Phase Half-Bridge Active Neutral-Point-Clamped Three-Level Inverter
Previous Article in Special Issue
IoT-GChain: Internet of Things-Assisted Secure and Tractable Grain Supply Chain Framework Leveraging Blockchain
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Provably Quantum Secure Three-Party Mutual Authentication and Key Exchange Protocol Based on Modular Learning with Error

1
School of Computer Engineering, Keimyung University, Daegu 42601, Republic of Korea
2
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(19), 3930; https://doi.org/10.3390/electronics13193930
Submission received: 4 September 2024 / Revised: 27 September 2024 / Accepted: 1 October 2024 / Published: 4 October 2024

Abstract

With the rapid development of quantum computers, post-quantum cryptography (PQC) has become critical technology in the security field. PQC includes cryptographic techniques that are secure against quantum-computer-based attacks, utilizing methods such as code-based, isogeny-based, and lattice-based approaches. Among these, lattice-based cryptography is the most extensively studied due to its ease of implementation and efficiency. As quantum computing advances, the need for secure communication protocols that can withstand quantum computer-based threats becomes increasingly important. Traditional two-party AKE protocols have a significant limitation: the security of the entire system can be compromised if either of the communicating parties behaves maliciously. To overcome this limitation, researchers have proposed three-party AKE protocols, where a third party acts as an arbiter or verifier. However, we found that a recently proposed three-party AKE protocol is vulnerable to quantum-computer-based attacks. To address this issue, we propose a provably quantum secure three-party AKE protocol based on MLWE. The proposed scheme leverages the user’s biometric information and the server’s master key to prevent the exposure of critical parameters. We analyzed the security of the protocol using simulation tools such as the Burrows–Abadi–Needham (BAN) logic, Real-or-Random (RoR) model, and Automated Validation of Internet Security Protocols and Applications (AVISPA). Furthermore, comparative analysis with similar protocols demonstrates that our protocol is efficient and suitable.
Keywords: post-quantum cryptography; learning with error (LWE); modular-LWE (MLWE); three-party authentication post-quantum cryptography; learning with error (LWE); modular-LWE (MLWE); three-party authentication

Share and Cite

MDPI and ACS Style

Park, H.; Son, S.; Park, Y.; Park, Y. Provably Quantum Secure Three-Party Mutual Authentication and Key Exchange Protocol Based on Modular Learning with Error. Electronics 2024, 13, 3930. https://doi.org/10.3390/electronics13193930

AMA Style

Park H, Son S, Park Y, Park Y. Provably Quantum Secure Three-Party Mutual Authentication and Key Exchange Protocol Based on Modular Learning with Error. Electronics. 2024; 13(19):3930. https://doi.org/10.3390/electronics13193930

Chicago/Turabian Style

Park, Hyewon, Seunghwan Son, Youngho Park, and Yohan Park. 2024. "Provably Quantum Secure Three-Party Mutual Authentication and Key Exchange Protocol Based on Modular Learning with Error" Electronics 13, no. 19: 3930. https://doi.org/10.3390/electronics13193930

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop