Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment |
| |
Authors: | Naveed Khan Zhang Jianbiao Intikhab Ullah Muhammad Salman Pathan Huhnkuk Lim |
| |
Affiliation: | 1.School of Medical Information Engineering, Guangzhou University of Chinese Medicine, Guangzhou, 510006, China2 Institute of Artificial Intelligence and Blockchain, Guangzhou University, Guangzhou, 510006, China |
| |
Abstract: | Public cloud computing provides a variety of services to consumers via high-speed internet. The consumer can access these services anytime and anywhere on a balanced service cost. Many traditional authentication protocols are proposed to secure public cloud computing. However, the rapid development of high-speed internet and organizations’ race to develop quantum computers is a nightmare for existing authentication schemes. These traditional authentication protocols are based on factorization or discrete logarithm problems. As a result, traditional authentication protocols are vulnerable in the quantum computing era. Therefore, in this article, we have proposed an authentication protocol based on the lattice technique for public cloud computing to resist quantum attacks and prevent all known traditional security attacks. The proposed lattice-based authentication protocol is provably secure under the Real-Or-Random (ROR) model. At the same time, the result obtained during the experiments proved that our protocol is lightweight compared to the existing lattice-based authentication protocols, as listed in the performance analysis section. The comparative analysis shows that the protocol is suitable for practical implementation in a quantum-based environment. |
| |
Keywords: | Lattice authentication quantum attack ProVerif |
|
| 点击此处可从《》浏览原始摘要信息 |
|
点击此处可从《》下载全文 |
|