期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment
1
作者 Naveed Khan Zhang Jianbiao +2 位作者 Intikhab Ullah Muhammad Salman Pathan huhnkuk lim 《Computers, Materials & Continua》 SCIE EI 2023年第4期35-49,共15页
Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocol... Public cloud computing provides a variety of services to consumersvia high-speed internet. The consumer can access these services anytimeand anywhere on a balanced service cost. Many traditional authenticationprotocols are proposed to secure public cloud computing. However, therapid development of high-speed internet and organizations’ race to developquantum computers is a nightmare for existing authentication schemes. Thesetraditional authentication protocols are based on factorization or discretelogarithm problems. As a result, traditional authentication protocols arevulnerable in the quantum computing era. Therefore, in this article, we haveproposed an authentication protocol based on the lattice technique for publiccloud computing to resist quantum attacks and prevent all known traditionalsecurity attacks. The proposed lattice-based authentication protocolis provably secure under the Real-Or-Random (ROR) model. At the sametime, the result obtained during the experiments proved that our protocol islightweight compared to the existing lattice-based authentication protocols,as listed in the performance analysis section. The comparative analysis showsthat the protocol is suitable for practical implementation in a quantum-basedenvironment. 展开更多
关键词 LATTICE AUTHENTICATION quantum attack ProVerif
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部