{"id":"https://openalex.org/W4402178472","doi":"https://doi.org/10.1145/3686625.3686634","title":"A Secure Authenticated Key Agreement Scheme Resilient Against Quantum Attacks","display_name":"A Secure Authenticated Key Agreement Scheme Resilient Against Quantum Attacks","publication_year":2024,"publication_date":"2024-07-19","ids":{"openalex":"https://openalex.org/W4402178472","doi":"https://doi.org/10.1145/3686625.3686634"},"language":"en","primary_location":{"id":"doi:10.1145/3686625.3686634","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3686625.3686634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Electronics Communication Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078713790","display_name":"Basker Palaniswamy","orcid":"https://orcid.org/0000-0002-3661-6048"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Basker Palaniswamy","raw_affiliation_strings":["National Sun Yat-sen University, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Sun Yat-sen University, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005435934","display_name":"Ting-Yu Chen","orcid":"https://orcid.org/0009-0009-6135-3508"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Ting-Yu Chen","raw_affiliation_strings":["National Sun Yat-sen University, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Sun Yat-sen University, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057179076","display_name":"Arijit Karati","orcid":"https://orcid.org/0000-0001-5605-7354"},"institutions":[{"id":"https://openalex.org/I142974352","display_name":"National Sun Yat-sen University","ror":"https://ror.org/00mjawt10","country_code":"TW","type":"education","lineage":["https://openalex.org/I142974352"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Arijit Karati","raw_affiliation_strings":["National Sun Yat-sen University, Taiwan"],"affiliations":[{"raw_affiliation_string":"National Sun Yat-sen University, Taiwan","institution_ids":["https://openalex.org/I142974352"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5078713790"],"corresponding_institution_ids":["https://openalex.org/I142974352"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12393058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"46","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6366143226623535},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.601957380771637},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5587380528450012},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5144286751747131},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.47390639781951904},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.43475422263145447},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.34906435012817383},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13186228275299072},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.1309916377067566},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.07172778248786926},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.061834752559661865}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6366143226623535},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.601957380771637},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5587380528450012},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5144286751747131},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.47390639781951904},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.43475422263145447},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.34906435012817383},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13186228275299072},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.1309916377067566},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.07172778248786926},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.061834752559661865},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3686625.3686634","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3686625.3686634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 6th International Electronics Communication Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W1881831204","https://openalex.org/W2007466965","https://openalex.org/W2146973388","https://openalex.org/W2155032609","https://openalex.org/W2514893051","https://openalex.org/W2866028610","https://openalex.org/W2991071002","https://openalex.org/W4245530642"],"related_works":["https://openalex.org/W1975289146","https://openalex.org/W2140798747","https://openalex.org/W2948169060","https://openalex.org/W2105887828","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W2730112582","https://openalex.org/W2110696645","https://openalex.org/W2358580169","https://openalex.org/W2111347279"],"abstract_inverted_index":{"The":[0,59],"rise":[1],"of":[2,12,54,83,98],"Web":[3],"3.0":[4],"has":[5],"propelled":[6],"the":[7,23,30,36,55,66,71,81,84,106,140,148],"Internet":[8],"to":[9,21,26,147],"new":[10],"heights":[11],"development.":[13],"However,":[14],"post-quantum":[15,149],"protocols":[16],"are":[17],"in":[18],"high":[19],"demand":[20],"ensure":[22],"utmost":[24],"security":[25,82,93,102,120],"keep":[27],"pace":[28],"with":[29],"advancements.":[31],"Our":[32,100,130],"solution":[33,132],"is":[34],"upgrading":[35],"traditional":[37,141],"synchronous":[38],"authenticated":[39],"identity":[40],"identification":[41],"and":[42,86,90,115,125,144],"key":[43,52,92,128],"agreement":[44],"protocol.":[45,58],"Specifically,":[46],"we":[47,78],"have":[48,79],"developed":[49],"an":[50,95],"asymmetric":[51],"version":[53],"quantum-safe":[56],"Needham-Schroeder":[57,68,142],"proposed":[60,107],"protocol":[61,85,108,143],"achieves":[62],"forward":[63],"secrecy,":[64],"which":[65],"classical":[67],"lacks.":[69],"Using":[70],"highly":[72],"flexible":[73],"universal":[74],"composability":[75],"framework":[76],"(iUC),":[77],"analyzed":[80],"achieved":[87],"mutual":[88],"authentication":[89],"session":[91],"for":[94],"unbounded":[96],"number":[97],"sessions.":[99],"informal":[101],"analysis":[103],"confirms":[104],"that":[105,137],"resists":[109],"known":[110],"attacks":[111],"such":[112],"as":[113],"replay":[114],"masquerading.":[116],"Besides,":[117],"it":[118],"satisfies":[119],"goals,":[121],"including":[122],"known-key":[123],"secrecy":[124],"ephemeral":[126],"secret":[127],"leakage.":[129],"modular":[131],"can":[133],"upgrade":[134],"practical":[135],"applications":[136],"rely":[138],"on":[139],"its":[145],"derivatives":[146],"era.":[150]},"counts_by_year":[],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
