Skip to main content

Advertisement

Log in

LWESM: learning with error based secure communication in mobile devices using fuzzy extractor

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Rapid-growth in wireless communication technologies and increasing demand smart devices are enabling users to access various services in remote areas. However, security and privacy are the two key attributes of wireless communication. To establish secure channel, various anonymous authentication schemes have been proposed based on classical number-theoretic hard assumptions ( discrete logarithm or factorization ) have been introduced in the last two or three decades. Due to Shor’s algorithm, a scheme based on number-theoretic assumptions could be broken by post-quantum computers in polynomial time. Therefore, we have proposed learning with errors based anonymous authentication protocol using ideal in some lattice. The security proof of the proposed technique ensures provable-security in the random oracle under learning with errors problem in some lattice. Furthermore, an informal security discussion and performance analysis show that our LWESM protocol is efficient and could be used in various applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  • Aguilar-Melchor C, Barrier J, Guelton S, Guinet A, Killijian MO, Lepoint T (2016) Nfllib: NTT-based fast lattice library. In: Cryptographers’ track at the RSA conference. Springer, pp 341–356

  • Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuellar J, Drielsma PH, Heam P, Kouchnarenko O, Mantovani J, et al. (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: Computer aided verification: 17th international conference, CAV 2005, Edinburgh, Scotland, UK, 6–10 July 2005, Proceedings, vol 3576. Springer Science & Business Media, p 281

  • Chang CC, Lee CY, Chiu YC (2009) Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Comput Commun 32(4):611–618

    Article  Google Scholar 

  • Chen CM, Wang KH, Yeh KH, Xiang B, Wu TY (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Humaniz Comput 10(8):3133–3142

    Article  Google Scholar 

  • Debiao H, Jianhua C, Jin H (2012) An id-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf Fusion 13(3):223–230

    Article  Google Scholar 

  • Dharminder D, Gupta P (2019) Security analysis and application of Chebyshev chaotic map in the authentication protocols. Int J Comput Appl. https://doi.org/10.1080/1206212X.2019.1682238

  • Dharminder D, Mishra D (2019) Lcppa: lattice-based conditional privacy preserving authentication in vehicular communication. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3810

    Article  Google Scholar 

  • Ding J, Xie X, Lin X (2012) A simple provably secure key exchange scheme based on the learning with errors problem. IACR Cryptol ePrint Arch 2012:688

    Google Scholar 

  • Ding J, Alsayigh S, Lancrenon J, Saraswathy R, Snook M (2017) Provably secure password authenticated key exchange based on RLWE for the post-quantum world. In: Cryptographers’ track at the RSA conference. Springer, pp 183–204

  • Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: International conference on the theory and applications of cryptographic techniques. Springer, pp 523–540

  • Feng Q, He D, Zeadally S, Kumar N, Liang K (2019) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775–2785

    Article  Google Scholar 

  • Gope P (2019) Anonymous mutual authentication with location privacy support for secure communication in M2M home network services. J Ambient Intell Humaniz Comput 10(1):153–161

    Article  Google Scholar 

  • Goriparthi T, Das ML, Negi A, Saxena A (2006) Cryptanalysis of recently proposed remote user authentication schemes. IACR Cryptol ePrint Arch 2006:28

    Google Scholar 

  • Gupta M, Chaudhari NS (2019) Anonymous roaming authentication protocol for wireless network with backward unlinkability, exculpability and efficient revocation check. J Ambient Intell Humaniz Comput 10(11):4491–4501

    Article  Google Scholar 

  • He D (2012) An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings. Ad Hoc Netw 10(6):1009–1016

    Article  Google Scholar 

  • He D, Kumar N, Lee JH, Sherratt RS (2014) Enhanced three-factor security protocol for consumer usb mass storage devices. IEEE Trans Consum Electron 60(1):30–37

    Article  Google Scholar 

  • He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052–2064

    Article  Google Scholar 

  • Islam SH, Obaidat MS, Amin R (2016) An anonymous and provably secure authentication scheme for mobile user. Int J Commun Syst 29(9):1529–1544

    Article  Google Scholar 

  • Jiang Q, Ma J, Li G, Yang L (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491

    Article  Google Scholar 

  • Jiang Q, Ma J, Wei F, Tian Y, Shen J, Yang Y (2016) An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J Netw Comput Appl 76:37–48

    Article  Google Scholar 

  • Juang WS, Wu JL (2009) Two efficient two-factor authenticated key exchange protocols in public wireless lans. Comput Electr Eng 35(1):33–40

    Article  Google Scholar 

  • Krawczyk H (2005) Hmqv: a high-performance secure Diffie–Hellman protocol. In: Annual international cryptology conference. Springer, pp 546–566

  • Lee CC, Chen CT, Wu PH, Chen TY (2013) Three-factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices. IET Comput Digit Tech 7(1):48–55

    Article  Google Scholar 

  • Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw 129:429–443

    Article  Google Scholar 

  • Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2018) A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl 103:194–204

    Article  Google Scholar 

  • Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 1–23

  • Madhusudhan R, Nayak CS (2019) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl 78(11):15255–15273

    Article  Google Scholar 

  • Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267–302

    Article  MathSciNet  Google Scholar 

  • Ruan O, Wang Q, Wang Z (2019) Provably leakage-resilient three-party password-based authenticated key exchange. J Ambient Intell Humaniz Comput 10(1):163–173

    Article  Google Scholar 

  • Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. IEEE, pp 124–134

  • Tsai JL, Lo NW (2015) Provably secure and efficient anonymous id-based authentication protocol for mobile devices using bilinear pairings. Wirel Pers Commun 83(2):1273–1286

    Article  Google Scholar 

  • Wang D, Ma CG (2013) Cryptanalysis of a remote user authentication scheme for mobile client–server environment based on ECC. Inf Fusion 14(4):498–503

    Article  Google Scholar 

  • Yang JH, Chang CC (2009) An id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput Secur 28(3–4):138–143

    Article  Google Scholar 

  • Zhang J, Zhang Z, Ding J, Snook M, Dagdelen Ö (2015) Authenticated key exchange from ideal lattices. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 719–751

  • Zhang L, Zhu S, Tang S (2016) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inform 21(2):465–475

    Article  Google Scholar 

  • Zhao D, Peng H, Li L, Yang Y (2014) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269

    Article  Google Scholar 

  • Zhu J, Ma J (2004) A new authentication scheme with anonymity for wireless environments. IEEE Trans Consum Electron 50(1):231–235

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dharminder Dharminder.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dharminder, D., Chandran, K.P. LWESM: learning with error based secure communication in mobile devices using fuzzy extractor. J Ambient Intell Human Comput 11, 4089–4100 (2020). https://doi.org/10.1007/s12652-019-01675-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-019-01675-7

Keywords

Navigation