LWESM: learning with error based secure communication in mobile devices using fuzzy extractor

  • PDF / 2,841,259 Bytes
  • 12 Pages / 595.276 x 790.866 pts Page_size
  • 18 Downloads / 206 Views

DOWNLOAD

REPORT


ORIGINAL RESEARCH

LWESM: learning with error based secure communication in mobile devices using fuzzy extractor Dharminder Dharminder1   · K. Prabhu Chandran2 Received: 28 September 2019 / Accepted: 20 December 2019 © Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract Rapid-growth in wireless communication technologies and increasing demand smart devices are enabling users to access various services in remote areas. However, security and privacy are the two key attributes of wireless communication. To establish secure channel, various anonymous authentication schemes have been proposed based on classical number-theoretic hard assumptions ( discrete logarithm or factorization ) have been introduced in the last two or three decades. Due to Shor’s algorithm, a scheme based on number-theoretic assumptions could be broken by post-quantum computers in polynomial time. Therefore, we have proposed learning with errors based anonymous authentication protocol using ideal in some lattice. The security proof of the proposed technique ensures provable-security in the random oracle under learning with errors problem in some lattice. Furthermore, an informal security discussion and performance analysis show that our LWESM protocol is efficient and could be used in various applications. Keywords  Security · Privacy · Authentication · Learning with error · Ideal lattice

1 Introduction Nowadays, an advanced progress in wireless network has been observed in daily life applications, encourages use of low-cost mobile devices. Every mobile user cares security and privacy to get an authorized access into a cloud networks for online data transfer, email, healthcare data etc., which is described in Fig. 1. Privacy of a mobile user in wireless communication is based on authentication, confidentiality, and user’s anonymity. In a communication, a user needs anonymity because, a user may be hacked to get his personal data and social online accounts. Currently, various cryptographic schemes are designed to achieve anonymity and security in communication among mobile users in a wireless networking system. In authentication and key agreement schemes (Ruan et al. 2019; Gope 2019; Chen et al. * Dharminder Dharminder [email protected] 1



Department of Mathematics, The LNM Institute of Information Technology, Jaipur 302031, India



Department of Electronics and Communication Engineering, Sreenivasa Institute of Technology and Management Studies (Autonomous), Chittoor, Andra Pradesh 517001, India

2

2019), mobile users and network service provider shared a private as well as public key respectively with the help of trusted third party or identity-based cryptosystem. To get authorized access to a cloud service, each user generates a pair of temporary public and private keys to establish a common shared session key. Now, a user and server communicate with this session key using an advanced symmetric encryption. An anonymous authentication scheme for mobile users permits a smart device to communicate on public channel