A Lattice-Based Group Authentication Scheme
Abstract
:1. Introduction
Contributions
2. Preliminaries
2.1. Notation
2.2. Lattices
2.3. The Gaussian Sampling Algorithm: SampleD(B, s, c, t)
- Input:
- 1.
- A basis B of a lattice;
- 2.
- A positive real parameter;
- 3.
- A center vector;
- 4.
- A vector.
- Output:A fresh random lattice vectordrawn from a distribution statistically close to, s, c, such that mod q.
2.4. The Basis Delegation Algorithm: BasisDel
- Input:
- 1.
- An arbitrarysuch that A is primitive;
- 2.
- An arbitrary basisof;
- 3.
- An arbitrary.
- Output:A basisofsuch that.
3. Our Construction
3.1. The Proposed Scheme
3.1.1. Setup
- Choose a security parameter .
- Choose integers and q , .
- Choose dimension and a bound .
- Choose a Gaussian parameter , where .
- Choose a set where and is independently chosen with uniform distribution. Note that is the public parameter for user .
- Let denote the function which converts a vector into a key of symmetric encryption.
- Let denote the symmetric encryption.
- Publish system parameters chosen as above.
3.1.2. Registration
3.1.3. Group Joining
- A sends via a security channel to a group manager.
- After receiving , the manager computes , , and .
- Then, the manager sends via a secure channel to .
3.1.4. Authentication
- First, the manager sends to .
- After receiving , computes , and then chooses a number randomly, and computes , .
- The sends to the manager.
- After receiving from each user, the manager performs the following: for to , the manager computes and , then checks if mod . If the check passes, the user is authenticated; otherwise, the manager aborts the session.
- Next, the manager performs as follows according to .
- First, the manager computes for to , , , and .
- The manager sends to each .
- After receiving , computes , and then checks if . If it is true, the manager is authenticated. Then, sets the session key .
- First, the manager chooses a number randomly.
- Then, the manager computes , and the manager sends to .
- After receiving , computes . The checks if . If it is true, the manager is authenticated. Then, sets the session key .
4. Security Analysis
- In this section, we provide the security analyses, which include the analyses on the replay attacks, the man-in-the-middle attacks, and the secure mutual authentication, where the detailed security proofs are shown in Appendix A. Replay Attacks:
- Man-in-the-Middle Attacks:
- Secure Mutual Authentication:
5. Performance Comparisons
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Appendix A
Appendix A.1. Security Proofs
Appendix A.1.1. Security Models
- Registration oracle: The outputs of this oracle are the public keyand the secret key.
- Group-joining oracle: The input of this oracle isand the output is.
- Authentication oracle: The inputs of the oracle are a group manager name, the group name, and the user of the group. The outputs of the oracle areand.
- i.
- The attacker sendsto the simulator. After receiving, the simulator computes.
- ii.
- The simulator chooses a numberrandomly, computes, and sendsto the attacker.
- iii.
- The attacker sendsto the simulator. If the attacker is authenticated, the attacker wins the game.
- i.
- The attacker sendsto the simulator. After receiving, the simulator computesand.
- ii.
- The simulator checks if. If it is true, the attacker is authenticated and wins the game.
- Registration oracle: The outputs of this oracle are the public keyand the secret key.
- Group joining oracle: The input of this oracle isand the output is.
- Authentication oracle: The inputs of the oracle are a group manager name, the group name, and the user of the group. The outputs of the oracle are and .
Appendix A.1.2. Security Proof
References
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
- Ajtai, M. Generating hard instances of lattice problems. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 99–108. [Google Scholar]
- Moustaine, E.E.; Laurent, M. A lattice-based authentication for low-cost RFID. In Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), Nice, France, 5–7 November 2012; pp. 68–73. [Google Scholar]
- Park, S.-W.; Lee, I.-Y. Mutual authentication scheme based on lattice for NFC-PCM payment service environment. Int. J. Distrib. Sens. Netw. 2016, 12. [Google Scholar] [CrossRef]
- Hoffstein, J.; Pipher, J.; Silverman, J.H. NTRU: A ring-based public key cryptosystem. In International Algorithmic Number Theory Symposium; Springer: Berlin, Germany, 1998; pp. 267–288. [Google Scholar]
- Mahabir, P.J.; Reihaneh, S.N. Compact accumulator using lattices. In Proceedings of the International Conference on Security, Privacy, and Applied Cryptography Engineering, Jaipur, India, 3–7 October 2015; Springer: Berlin, Germany, 2015; pp. 347–358. [Google Scholar]
- Alwen, J. Generating shorter bases for hard random lattices. Theory Comput. Syst. 2011, 48, 535–553. [Google Scholar] [CrossRef]
- Micciancio, D. Trapdoors for lattices: Simpler, tighter, faster, smaller. EuroCrypt 2012, 7237, 700–718. [Google Scholar]
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, BC, Canada, 17–20 May 2008; ACM: New York, NY, USA, 2008; pp. 197–206. [Google Scholar]
- Bellare, M.; Rogaway, P. Entity authentication and key distribution. Crypto 1993, 93, 232–249. [Google Scholar]
- Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C. Bonsai trees, or how to delegate a lattice basis. Eurocrypt 2010, 6110, 523–552. [Google Scholar]
- Sahu, S.K.; Kushwaha, A. Performance analysis of symmetric encryption algorithms for mobile ad hoc network. Int. J. Emerg. Technol. Adv. Eng. 2014, 4, 619–624. [Google Scholar]
- Follath, J. Gaussian sampling in lattice based cryptography. Tatra Mt. Math. Publ. 2014, 60, 1–23. [Google Scholar] [CrossRef]
- Gaj, K.; Homsirikamol, E.; Rogawski, M. Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Santa Barbara, CA, USA, 17–20 August 2010; pp. 264–278. [Google Scholar]
- Min, H.S.; Yeop, O.S.; Hyunsoo, Y. New modular multiplication algorithms for fast modular exponentiation. EuroCrypt 1996, 1070, 166–177. [Google Scholar]
- Micciancio, D.; Regev, O. Lattice-based cryptography. In Post-Quantum Cryptography; Springer: Berlin, Germany, 2009; pp. 147–191. [Google Scholar]
- Krawczyk, H.; Bellare, M.; Canetti, R. HMAC: Keyed-Hashing for Message Authentication; ACM: New York, NY, USA, 1997; Available online: https://tools.ietf.org/html/rfc2104 (accessed on 10 July 2017).
Notations | Meaning |
---|---|
The Gram–Schmidt norm | |
Security parameter | |
An integer | |
Prime | |
Dimension | |
Gaussian parameter | |
A message set, | |
Public key | |
Secret key | |
Exclusive matrix of | |
Convert a vector into a key of symmetrical encryption |
Moustaine et al.’s Scheme | Park et al.’s Scheme | Our Scheme | |
---|---|---|---|
Mutual Authentication | Yes | Yes | Yes |
Group Authentication | No | No | Yes |
No Replay Attack | Yes | Yes | Yes |
No Man-in-the-Middle Attack | Yes | Yes | Yes |
Server (Manager/Reader or Back-End/Bank) | User (Tag) | |
---|---|---|
Our Scheme | 11,000.52 ms | 31.75 ms |
Moustaine et al.’s Scheme | 15,283.17 ms | 0.00259 ms |
Park et al.’s Scheme | 3820.79 ms | 7641.59 ms |
Group Manager | Group Member | Total Cost | |
---|---|---|---|
Our Scheme | 11,000.52 | 31.75 | 11,032.27 |
Moustaine et al.’s Scheme | 15,283.17 | 0.00259 | 15,283.17 |
Park et al.’s Scheme | 3820.79 | 7641.59 | 11,462.38 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Huang, J.-J.; Tseng, Y.-F.; Yang, Q.-L.; Fan, C.-I. A Lattice-Based Group Authentication Scheme. Appl. Sci. 2018, 8, 987. https://doi.org/10.3390/app8060987
Huang J-J, Tseng Y-F, Yang Q-L, Fan C-I. A Lattice-Based Group Authentication Scheme. Applied Sciences. 2018; 8(6):987. https://doi.org/10.3390/app8060987
Chicago/Turabian StyleHuang, Jheng-Jia, Yi-Fan Tseng, Qi-Liang Yang, and Chun-I Fan. 2018. "A Lattice-Based Group Authentication Scheme" Applied Sciences 8, no. 6: 987. https://doi.org/10.3390/app8060987
APA StyleHuang, J. -J., Tseng, Y. -F., Yang, Q. -L., & Fan, C. -I. (2018). A Lattice-Based Group Authentication Scheme. Applied Sciences, 8(6), 987. https://doi.org/10.3390/app8060987