Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices

Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang

Research output: Contribution to journalArticlepeer-review

83 Scopus citations

Abstract

The rapid advances of wireless communication technologies along with the popularity of mobile devices are enabling users to access various web services anywhere and anytime. Due to the openness of wireless communications, security becomes a vital issue. To provide secure communication, many anonymous authentication protocols in mobile client-server environments based on classical mathematical hard assumptions (i.e., discrete logarithm problem or integer factorization problem) have been presented in last two decades. However, both of the two assumptions can be solved by postquantum computers in polynomial time, which means these protocols are never secure in the postquantum era. To mitigate such types of attacks, we propose an ideal lattice-based anonymous authentication protocol for mobile client-server environments. A detailed security proof shows that our proposed protocol is provably secure under a random oracle model based on the difficulty of the ring learning with errors problem. Furthermore, the informal security analysis and experimental implementation show that our proposed protocol is practical for real-world mobile client-server environments.

Original languageEnglish
Article number8417960
Pages (from-to)2775-2785
Number of pages11
JournalIEEE Systems Journal
Volume13
Issue number3
DOIs
StatePublished - Sep 2019

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Anonymity
  • authentication
  • ideal lattice
  • mobile device
  • provably security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices'. Together they form a unique fingerprint.

Cite this