Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices

Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang

Research output: Contribution to journalArticlepeer-review

47 Scopus citations

Abstract

The rapid advances of wireless communication technologies along with the popularity of mobile devices are enabling users to access various web services anywhere and anytime. Due to the openness of wireless communications, security becomes a vital issue. To provide secure communication, many anonymous authentication protocols in mobile client-server environments based on classical mathematical hard assumptions (i.e., discrete logarithm problem or integer factorization problem) have been presented in last two decades. However, both of the two assumptions can be solved by postquantum computers in polynomial time, which means these protocols are never secure in the postquantum era. To mitigate such types of attacks, we propose an ideal lattice-based anonymous authentication protocol for mobile client-server environments. A detailed security proof shows that our proposed protocol is provably secure under a random oracle model based on the difficulty of the ring learning with errors problem. Furthermore, the informal security analysis and experimental implementation show that our proposed protocol is practical for real-world mobile client-server environments.

Original languageEnglish
Article number8417960
Pages (from-to)2775-2785
Number of pages11
JournalIEEE Systems Journal
Volume13
Issue number3
DOIs
StatePublished - Sep 2019

Bibliographical note

Funding Information:
Manuscript received February 3, 2018; revised May 7, 2018; accepted June 23, 2018. Date of publication July 23, 2018; date of current version August 23, 2019. This work was supported in part by the National Natural Science Foundation of China under Grants 61572379, 61501333, 61572370, U1536204, 61472287, and 61772377, in part by the National High-Tech R&D Program of China (863 Program) under Grant 2015AA016004, in part by the Research Fund of the Guangxi Key Laboratory of Trusted Software under Grant kx201529, and in part by the Natural Science Foundation of Hubei Province of China under Grants 2015CFB257, 2017CFA007, and 2015CFA068. (Corresponding author: Debiao He.) Q. Feng and D. He are with the Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China and also with the Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China (e-mail:, fq.whu@whu.edn.cn; hedebiao@163.com).

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Anonymity
  • authentication
  • ideal lattice
  • mobile device
  • provably security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices'. Together they form a unique fingerprint.

Cite this