首页 | 本学科首页   官方微博 | 高级检索  
     


Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment
Authors:Naveed Khan  Zhang Jianbiao  Intikhab Ullah  Muhammad Salman Pathan  Huhnkuk Lim
Affiliation:1.School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou, 510006, China2 Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, 510006, China
Abstract:Public cloud computing provides a variety of services to consumers via high-speed internet. The consumer can access these services anytime and anywhere on a balanced service cost. Many traditional authentication protocols are proposed to secure public cloud computing. However, the rapid development of high-speed internet and organizations’ race to develop quantum computers is a nightmare for existing authentication schemes. These traditional authentication protocols are based on factorization or discrete logarithm problems. As a result, traditional authentication protocols are vulnerable in the quantum computing era. Therefore, in this article, we have proposed an authentication protocol based on the lattice technique for public cloud computing to resist quantum attacks and prevent all known traditional security attacks. The proposed lattice-based authentication protocol is provably secure under the Real-Or-Random (ROR) model. At the same time, the result obtained during the experiments proved that our protocol is lightweight compared to the existing lattice-based authentication protocols, as listed in the performance analysis section. The comparative analysis shows that the protocol is suitable for practical implementation in a quantum-based environment.
Keywords:Lattice  authentication  quantum attack  ProVerif
点击此处可从《》浏览原始摘要信息
点击此处可从《》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号