A Secure Authenticated Key Agreement Scheme Resilient Against Quantum Attacks

Research output: Chapter in Book/Report/Conference proceedingsConference proceedingpeer-review

Abstract

The rise of Web 3.0 has propelled the Internet to new heights of development. However, post-quantum protocols are in high demand to ensure the utmost security to keep pace with the advancements. Our solution is upgrading the traditional synchronous authenticated identity identification and key agreement protocol. Specifically, we have developed an asymmetric key version of the quantum-safe Needham-Schroeder protocol. The proposed protocol achieves forward secrecy, which the classical Needham-Schroeder lacks. Using the highly flexible universal composability framework (iUC), we have analyzed the security of the protocol and achieved mutual authentication and session key security for an unbounded number of sessions. Our informal security analysis confirms that the proposed protocol resists known attacks such as replay and masquerading. Besides, it satisfies security goals, including known-key secrecy and ephemeral secret key leakage. Our modular solution can upgrade practical applications that rely on the traditional Needham-Schroeder protocol and its derivatives to the post-quantum era.

Original languageEnglish
Title of host publicationIECC 2024 - 2024 6th International Electronics Communication Conference
PublisherAssociation for Computing Machinery
Pages46-55
Number of pages10
ISBN (Electronic)9798400717598
DOIs
Publication statusPublished - 19 Jul 2024
Externally publishedYes
Event6th International Electronics Communication Conference, IECC 2024 - Hybrid, Fukuoka, Japan
Duration: 19 Jul 202421 Jul 2024

Publication series

NameACM International Conference Proceeding Series

Conference

Conference6th International Electronics Communication Conference, IECC 2024
Country/TerritoryJapan
CityHybrid, Fukuoka
Period19/07/2421/07/24

Keywords

  • Authentication
  • Frodo
  • Needham-Schroeder protocol
  • Quantum-resistant authentication
  • Quantum-safe authentication
  • Universal composability

Fingerprint

Dive into the research topics of 'A Secure Authenticated Key Agreement Scheme Resilient Against Quantum Attacks'. Together they form a unique fingerprint.

Cite this