Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security

K Seyhan, TN Nguyen, S Akleylek, K Cengiz… - Journal of Information …, 2021 - Elsevier
We propose a new bilateral generalization inhomogeneous short integer solution (Bi-GISIS)-
based key exchange protocol with reusable key feature for post-quantum IoT security. It is …

LBA-PAKE: lattice-based anonymous password authenticated key exchange for mobile devices

V Dabra, A Bala, S Kumari - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
The recent advancement in quantum computers generates the threat alarm of breaking the
security of key exchange protocols, which is based on discrete logarithmic or prime …

Further analysis and improvements of a lattice-based anonymous PAKE scheme

R Ding, C Cheng, Y Qin - IEEE Systems Journal, 2022 - ieeexplore.ieee.org
To improve the security of mobile networks in the postquantum era, Dabra et al. recently
proposed a lattice-based anonymous password-authenticated key exchange (LBA-PAKE) …

Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices

P Rewal, M Singh, D Mishra, K Pursharthi… - Journal of Information …, 2023 - Elsevier
Mobile-based web apps have gained popularity among phone devices because of the rapid
advancement of mobile communication and equipment capabilities. Users may utilize their …

A probably secure bi-GISIS based modified AKE scheme with reusable keys

S Akleylek, K Seyhan - IEEE Access, 2020 - ieeexplore.ieee.org
In this paper, we propose a novel authenticated key exchange scheme based on the Bi-
GISIS problem for the post-quantum world. The security of the proposed scheme is based on …

Key exchange and authenticated key exchange with reusable keys based on RLWE assumption

J Ding, P Branco, K Schmitt - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Key Exchange (KE) is, undoubtedly, one of the most used cryptographic primitives in
practice. Its authenticated version, Authenticated Key Exchange (AKE), avoids man-in-the …

A computationally efficient and randomized RLWE-based key exchange scheme

K Pursharthi, D Mishra - Cluster Computing, 2024 - Springer
Key exchange enables two or more entities to agree on an identical key. In post-quantum,
the construction of ring learning with error (RLWE) based key exchange provides a strong …

A new lattice-based password authenticated key exchange scheme with anonymity and reusable key

K Seyhan, S Akleylek - PeerJ Computer Science, 2024 - peerj.com
In this article, we propose a novel bilateral generalization inhomogenous short integer
solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post …

Improved attacks against key reuse in learning with errors key exchange

N Bindel, D Stebila, S Veitch - … on Cryptology and Information Security in …, 2021 - Springer
Basic key exchange protocols built from the learning with errors (LWE) assumption are
insecure if secret keys are reused in the face of active attackers. One example of this is …

Towards post-quantum authenticated key agreement scheme for mobile devices

K Pursharthi, D Mishra - Journal of Information Security and Applications, 2024 - Elsevier
Mobile device communication enables mobile devices to connect with each other, exchange
data, and access services, where security is a crucial aspect to protect sensitive data and …