{"id":"https://openalex.org/W4388937902","doi":"https://doi.org/10.1109/icccnt56998.2023.10306940","title":"A Construction of Three Party Post Quantum Secure Authenticated Key Exchange for Mobile Users","display_name":"A Construction of Three Party Post Quantum Secure Authenticated Key Exchange for Mobile Users","publication_year":2023,"publication_date":"2023-07-06","ids":{"openalex":"https://openalex.org/W4388937902","doi":"https://doi.org/10.1109/icccnt56998.2023.10306940"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt56998.2023.10306940","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306940","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044819025","display_name":"Uddeshaya Kumar","orcid":"https://orcid.org/0000-0001-8041-3697"},"institutions":[{"id":"https://openalex.org/I33552525","display_name":"LNM Institute of Information Technology","ror":"https://ror.org/03jp7rg16","country_code":"IN","type":"education","lineage":["https://openalex.org/I33552525"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Uddeshaya Kumar","raw_affiliation_strings":["The LNM Institute of Information Technology,Dept. of Mathematics,Jaipur,India","Dept. of Mathematics, The LNM Institute of Information Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"The LNM Institute of Information Technology,Dept. of Mathematics,Jaipur,India","institution_ids":["https://openalex.org/I33552525"]},{"raw_affiliation_string":"Dept. of Mathematics, The LNM Institute of Information Technology, Jaipur, India","institution_ids":["https://openalex.org/I33552525"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004154993","display_name":"Yogesh Pal","orcid":"https://orcid.org/0000-0002-9227-4900"},"institutions":[{"id":"https://openalex.org/I3129773123","display_name":"Bennett University","ror":"https://ror.org/00an5hx75","country_code":"IN","type":"education","lineage":["https://openalex.org/I3129773123"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Yogesh Pal","raw_affiliation_strings":["Bennett University,Dept. of Mathematics(SCSET),Noida,India","Dept. of Mathematics(SCSET), Bennett University, Noida, India"],"affiliations":[{"raw_affiliation_string":"Bennett University,Dept. of Mathematics(SCSET),Noida,India","institution_ids":["https://openalex.org/I3129773123"]},{"raw_affiliation_string":"Dept. of Mathematics(SCSET), Bennett University, Noida, India","institution_ids":["https://openalex.org/I3129773123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077336132","display_name":"Perla Sai Nikhil","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Perla Sai Nikhil","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science &#x0026; Engineering,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science &#x0026; Engineering,Chennai,India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060984628","display_name":"Manish Garg","orcid":"https://orcid.org/0000-0003-2066-5221"},"institutions":[{"id":"https://openalex.org/I33552525","display_name":"LNM Institute of Information Technology","ror":"https://ror.org/03jp7rg16","country_code":"IN","type":"education","lineage":["https://openalex.org/I33552525"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manish Garg","raw_affiliation_strings":["The LNM Institute of Information Technology,Dept. of Mathematics,Jaipur,India","Dept. of Mathematics, The LNM Institute of Information Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"The LNM Institute of Information Technology,Dept. of Mathematics,Jaipur,India","institution_ids":["https://openalex.org/I33552525"]},{"raw_affiliation_string":"Dept. of Mathematics, The LNM Institute of Information Technology, Jaipur, India","institution_ids":["https://openalex.org/I33552525"]}]},{"author_position":"middle","author":{"id":null,"display_name":"M. Ranjith Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M. Ranjith Kumar","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Engineering,Dept. of Mathematics,Chennai,India","Dept. of Mathematics, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Chennai, India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Engineering,Dept. of Mathematics,Chennai,India","institution_ids":["https://openalex.org/I81556334"]},{"raw_affiliation_string":"Dept. of Mathematics, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Chennai, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114109225","display_name":"Dharminder Chaudhary","orcid":null},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dharminder Chaudhary","raw_affiliation_strings":["Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science &#x0026; Engineering,Chennai,India"],"affiliations":[{"raw_affiliation_string":"Amrita Vishwa Vidyapeetham,Amrita School of Computing,Dept. of Computer Science &#x0026; Engineering,Chennai,India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044819025"],"corresponding_institution_ids":["https://openalex.org/I33552525"],"apc_list":null,"apc_paid":null,"fwci":0.3439,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67227118,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7552549839019775},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.7326453924179077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6362701058387756},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5677671432495117},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.5396018624305725},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4637399911880493},{"id":"https://openalex.org/keywords/zero-knowledge-password-proof","display_name":"Zero-knowledge password proof","score":0.4465772211551666},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.43179360032081604},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4295104742050171},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41062289476394653},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40357765555381775},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.3983820080757141},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2800622582435608},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.27331918478012085}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7552549839019775},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.7326453924179077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6362701058387756},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5677671432495117},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.5396018624305725},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4637399911880493},{"id":"https://openalex.org/C188615804","wikidata":"https://www.wikidata.org/wiki/Q8069448","display_name":"Zero-knowledge password proof","level":5,"score":0.4465772211551666},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.43179360032081604},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4295104742050171},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41062289476394653},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40357765555381775},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.3983820080757141},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2800622582435608},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.27331918478012085}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt56998.2023.10306940","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccnt56998.2023.10306940","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W580467909","https://openalex.org/W1982339016","https://openalex.org/W1984880769","https://openalex.org/W1994790157","https://openalex.org/W2020237187","https://openalex.org/W2025782749","https://openalex.org/W2035946966","https://openalex.org/W2098295055","https://openalex.org/W2132648536","https://openalex.org/W2293449522","https://openalex.org/W2548111050","https://openalex.org/W2592817464","https://openalex.org/W2895236855","https://openalex.org/W3041876782","https://openalex.org/W3209363453","https://openalex.org/W4293168393"],"related_works":["https://openalex.org/W879126295","https://openalex.org/W2387383457","https://openalex.org/W2377075426","https://openalex.org/W2376278636","https://openalex.org/W2355098320","https://openalex.org/W2063867724","https://openalex.org/W2380050590","https://openalex.org/W2563748949","https://openalex.org/W2021337165","https://openalex.org/W1601753247"],"abstract_inverted_index":{"A":[0],"three-party":[1,58],"authenticated":[2],"key":[3,14,37,88,137],"exchange":[4,89],"protocol":[5,59,102,122,149],"enables":[6],"two":[7],"entities":[8],"to":[9,52,61,159],"agree":[10],"on":[11,91],"a":[12,19,30,82,92,130],"session":[13],"with":[15],"the":[16,42,62,69,97,121,142],"help":[17],"of":[18,44,73,94,144],"dedicated":[20],"server":[21],"through":[22],"an":[23],"insecure":[24],"channel.":[25],"Lattice":[26],"based":[27,57,90,126],"cryptography":[28,127],"plays":[29,129],"very":[31,131],"important":[32,132],"role":[33,133],"in":[34,134],"authentication":[35,119,135],"and":[36,68,114,136,156,167],"exchanges":[38,138],"that":[39,128,139,163],"protects":[40,140],"against":[41,105,141,153],"threat":[43,143],"quantum":[45,54,85,145,154],"attacks.":[46,117,146],"However,":[47],"it":[48],"is":[49],"not":[50],"easy":[51],"design":[53],"resistant":[55],"password":[56,111],"due":[60,158],"high":[63],"demand":[64],"for":[65],"security":[66,104],"requirements":[67],"limited":[70],"resources":[71],"nature":[72],"mobile":[74],"devices.":[75],"In":[76,118],"this":[77],"article,":[78],"we":[79],"have":[80,123],"proposed":[81,148],"new":[83],"post":[84],"three":[86],"party":[87],"variant":[93],"lattice":[95,125],"assumption,":[96],"ring":[98],"learning":[99],"errors.":[100],"The":[101,147],"ensures":[103,150],"impersonation":[106],"attack,":[107,110,113],"stolen":[108],"smartcard":[109],"guessing":[112],"other":[115],"existing":[116],"phase,":[120],"used":[124],"both":[151],"securities":[152],"attacks":[155],"efficiency":[157],"simple":[160],"algebraic":[161],"operations":[162],"are":[164],"polynomial":[165],"addition":[166],"multiplications.":[168]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
