Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices

Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang

Research output: Contribution to journalArticlepeer-review

97 Scopus citations

Abstract

The rapid advances of wireless communication technologies along with the popularity of mobile devices are enabling users to access various web services anywhere and anytime. Due to the openness of wireless communications, security becomes a vital issue. To provide secure communication, many anonymous authentication protocols in mobile client-server environments based on classical mathematical hard assumptions (i.e., discrete logarithm problem or integer factorization problem) have been presented in last two decades. However, both of the two assumptions can be solved by postquantum computers in polynomial time, which means these protocols are never secure in the postquantum era. To mitigate such types of attacks, we propose an ideal lattice-based anonymous authentication protocol for mobile client-server environments. A detailed security proof shows that our proposed protocol is provably secure under a random oracle model based on the difficulty of the ring learning with errors problem. Furthermore, the informal security analysis and experimental implementation show that our proposed protocol is practical for real-world mobile client-server environments.

Original languageEnglish
Article number8417960
Pages (from-to)2775-2785
Number of pages11
JournalIEEE Systems Journal
Volume13
Issue number3
DOIs
StatePublished - Sep 2019

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Funding

Manuscript received February 3, 2018; revised May 7, 2018; accepted June 23, 2018. Date of publication July 23, 2018; date of current version August 23, 2019. This work was supported in part by the National Natural Science Foundation of China under Grants 61572379, 61501333, 61572370, U1536204, 61472287, and 61772377, in part by the National High-Tech R&D Program of China (863 Program) under Grant 2015AA016004, in part by the Research Fund of the Guangxi Key Laboratory of Trusted Software under Grant kx201529, and in part by the Natural Science Foundation of Hubei Province of China under Grants 2015CFB257, 2017CFA007, and 2015CFA068. (Corresponding author: Debiao He.) Q. Feng and D. He are with the Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China and also with the Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China (e-mail:, [email protected]; [email protected]).

FundersFunder number
open fund of the Guangxi Key Laboratory of Trusted Softwarekx201529
National Natural Science Foundation of China (NSFC)61572379, U1536204, 61501333, 61772377, 61472287, 61572370
Natural Science Foundation of Hubei Province2017CFA007, 2015CFA068, 2015CFB257
National High-tech Research and Development Program2015AA016004

    Keywords

    • Anonymity
    • authentication
    • ideal lattice
    • mobile device
    • provably security

    ASJC Scopus subject areas

    • Control and Systems Engineering
    • Information Systems
    • Computer Science Applications
    • Computer Networks and Communications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices'. Together they form a unique fingerprint.

    Cite this