Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security

Abstract We propose a new bilateral generalization inhomogeneous short integer solution (Bi-GISIS)-based key exchange protocol with reusable key feature for post-quantum IoT security. It is aimed to reduce the time consumption in the key generation of key exchange protocols to be used in IoT devices. To obtain reusable key, we define modified bilateral pasteurization in the random oracle model. By ensuring reusable keys, the same key becomes available in several executions of the proposed protocol. This feature allows efficient usage of reusable keys in resource-constrained IoT architectures. The proposed scheme is suitable for quantum secure key exchange in D2D-aided fog computing environment. A key exchange protocol with improved key management process is constructed for D2D.

[1]  Oded Regev,et al.  Lattice-Based Cryptography , 2006, CRYPTO.

[2]  Abed Ellatif Samhat,et al.  Mobility Management With Session Continuity During Handover in LPWAN , 2020, IEEE Internet of Things Journal.

[3]  Hanyi Zhang,et al.  A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City , 2020, IEEE Internet of Things Journal.

[4]  Xiaodong Wang,et al.  Distributed Error Correction Coding Scheme for Low Storage Blockchain Systems , 2020, IEEE Internet of Things Journal.

[5]  M. Majid Butt,et al.  Agent-Based Modeling for Distributed Decision Support in an IoT Network , 2020, IEEE Internet of Things Journal.

[6]  Jintai Ding,et al.  A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem , 2019, C2SI.

[7]  Tiago M. Fernandez-Carames,et al.  From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things , 2020, IEEE Internet of Things Journal.

[8]  Xi Chen,et al.  Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks , 2020, IEEE Internet of Things Journal.

[9]  SK Hafizul Islam,et al.  Provably secure two-party authenticated key agreement protocol for post-quantum environments , 2020, J. Inf. Secur. Appl..

[10]  Yulei Wu,et al.  FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things , 2020, IEEE Internet of Things Journal.

[11]  Danda B. Rawat,et al.  Wireless Virtualization Architecture: Wireless Networking for Internet of Things , 2020, IEEE Internet of Things Journal.

[12]  Jintai Ding,et al.  A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..

[13]  Jintai Ding,et al.  How to validate the secret of a Ring Learning with Errors (RLWE) key , 2018, IACR Cryptol. ePrint Arch..

[14]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[15]  Sherali Zeadally,et al.  Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.

[16]  Sedat Akleylek,et al.  A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys , 2020, IEEE Access.

[17]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[18]  Jintai Ding,et al.  Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption , 2019, IACR Cryptol. ePrint Arch..

[19]  Zilong Liu,et al.  A Flexible and Generic Gaussian Sampler With Power Side-Channel Countermeasures for Quantum-Secure Internet of Things , 2020, IEEE Internet of Things Journal.

[20]  Zheng Yang,et al.  Randomized authentication primitive problem in key exchange with strong security , 2017, J. Inf. Secur. Appl..

[21]  Daniele Micciancio Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.

[22]  Chris Peikert,et al.  A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..

[23]  Chunsheng Gu,et al.  Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement , 2018, Cluster Computing.

[24]  Xiaojiang Du,et al.  Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles , 2020, IEEE Internet of Things Journal.

[25]  Gil Segev,et al.  Public-Key Cryptographic Primitives Provably as Secure as Subset Sum , 2010, TCC.