A three-party authenticated key exchange protocol enables two entities to agree on a session key with the help of a dedicated server over a public channel. Shor's algorithm is a big threat to existing authenticated key exchange protocols. Lattice based cryptography plays a very important role in designing authentication and key agreements secure against the threat of quantum attacks. However, it is not an easy job to design quantum resistant password based three party protocols due to the high demand for security requirements and the limited resources nature of mobile devices. In this article, we have proposed a new post quantum three party key exchange based on ring learning with errors assumption. This protocol is motivated by Islam et al.'s authenticated key exchange protocol. Their protocol is not secure against stolen smartcard attacks, or password guessing attacks, and can't provide user anonymity. Anonymous communication is a big requirement for practical applications like e-healthcare services/smart vehicular communication. This paper also contains the performance analysis of the proposed protocol along with other relevant protocols.
CITATION STYLE
Chaudhary, D., Kumar, U., & Saleem, K. (2023). A Construction of Three Party Post Quantum Secure Authenticated Key Exchange Using Ring Learning With Errors and ECC Cryptography. IEEE Access, 11, 136947–136957. https://doi.org/10.1109/ACCESS.2023.3325886
Mendeley helps you to discover research relevant for your work.