{"id":"https://openalex.org/W3210521444","doi":"https://doi.org/10.23919/jcin.2021.9549124","title":"An Anti-Quantum Authentication Protocol for Space Information Networks Based on Ring Learning with Errors","display_name":"An Anti-Quantum Authentication Protocol for Space Information Networks Based on Ring Learning with Errors","publication_year":2021,"publication_date":"2021-09-01","ids":{"openalex":"https://openalex.org/W3210521444","doi":"https://doi.org/10.23919/jcin.2021.9549124","mag":"3210521444"},"language":"en","primary_location":{"id":"doi:10.23919/jcin.2021.9549124","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2021.9549124","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103009310","display_name":"Junyan Guo","orcid":"https://orcid.org/0000-0003-2152-0219"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junyan Guo","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061526892","display_name":"Ye Du","orcid":"https://orcid.org/0000-0003-1791-8275"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ye Du","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067575494","display_name":"Xuesong Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuesong Wu","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":null,"display_name":"Meihong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meihong Li","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China"],"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China","institution_ids":["https://openalex.org/I21193070"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103009310"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":2.0708,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.87610448,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"6","issue":"3","first_page":"301","last_page":"311"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9746000170707703,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9329000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9286999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7282789945602417},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.632744312286377},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.5770964622497559},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5369901657104492},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5266135931015015},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.4740849733352661},{"id":"https://openalex.org/keywords/otway\u2013rees-protocol","display_name":"Otway\u2013Rees protocol","score":0.47205644845962524},{"id":"https://openalex.org/keywords/challenge\u2013response-authentication","display_name":"Challenge\u2013response authentication","score":0.43261879682540894},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.42037534713745117},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3931802213191986},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3482045531272888},{"id":"https://openalex.org/keywords/challenge-handshake-authentication-protocol","display_name":"Challenge-Handshake Authentication Protocol","score":0.3166760504245758}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7282789945602417},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.632744312286377},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.5770964622497559},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5369901657104492},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5266135931015015},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.4740849733352661},{"id":"https://openalex.org/C35788789","wikidata":"https://www.wikidata.org/wiki/Q1320237","display_name":"Otway\u2013Rees protocol","level":5,"score":0.47205644845962524},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.43261879682540894},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.42037534713745117},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3931802213191986},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3482045531272888},{"id":"https://openalex.org/C207828512","wikidata":"https://www.wikidata.org/wiki/Q1060131","display_name":"Challenge-Handshake Authentication Protocol","level":4,"score":0.3166760504245758}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/jcin.2021.9549124","is_oa":false,"landing_page_url":"https://doi.org/10.23919/jcin.2021.9549124","pdf_url":null,"source":{"id":"https://openalex.org/S4210178728","display_name":"Journal of Communications and Information Networks","issn_l":"2096-1081","issn":["2096-1081","2509-3312"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Information Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2377502939","https://openalex.org/W2406792259","https://openalex.org/W2355452447","https://openalex.org/W2490834464","https://openalex.org/W2355344682","https://openalex.org/W2362358462","https://openalex.org/W3045615609","https://openalex.org/W2388928260","https://openalex.org/W2367067697","https://openalex.org/W2915235342"],"abstract_inverted_index":{"With":[0],"the":[1,28,33,36,39,74,79,104,109,160,166],"continuous":[2],"development":[3,105],"of":[4,9,35,45,78,92,106],"satellite":[5,24],"communication":[6],"and":[7,13,22,59,71,76,123,157,169],"Internet":[8],"things":[10],"technology,":[11],"more":[12,14,154,180],"devices":[15,185],"can":[16,178],"access":[17,70,88,142,187],"space":[18],"information":[19],"networks":[20],"(SIN)":[21],"enjoy":[23],"services":[25],"everywhere":[26],"in":[27],"world.":[29],"However,":[30],"due":[31],"to":[32,67,97,186],"openness":[34],"air-to-ground":[37],"channel,":[38],"device":[40],"will":[41,65],"face":[42,129],"a":[43,139],"series":[44],"security":[46,63,87,99,131,155,167],"threats":[47,64],"when":[48],"accessing":[49],"SIN,":[50],"such":[51,119],"as":[52,120],"replay":[53],"attacks,":[54,56,58],"eavesdropping":[55],"impersonation":[57],"man-in-the-middle":[60],"attacks.":[61],"These":[62],"lead":[66],"illegal":[68],"entity":[69],"further":[72],"endanger":[73],"reliability":[75],"availability":[77],"system.":[80],"Although":[81],"scholars":[82],"have":[83,94,98],"proposed":[84],"many":[85],"enhanced":[86],"authentication":[89,111,143,161],"protocols,":[90],"most":[91],"them":[93],"been":[95],"proved":[96],"vulnerabilities.":[100],"In":[101,133],"addition,":[102],"with":[103,149],"quantum":[107],"computing,":[108],"previous":[110],"protocols":[112],"based":[113,145],"on":[114,146],"some":[115],"asymmetric":[116],"cryptographic":[117,126],"mechanisms":[118,127],"discrete":[121],"logarithm":[122],"elliptic":[124],"curve":[125],"may":[128],"new":[130],"challenges.":[132],"this":[134,136],"context,":[135],"paper":[137],"proposes":[138],"novel":[140],"anti-quantum":[141],"protocol":[144,177],"ring":[147],"learning":[148],"errors":[150],"(RLWE),":[151],"which":[152],"meets":[153],"requirements":[156],"greatly":[158],"reduces":[159],"delay":[162],"through":[163],"pre-negotiation.":[164],"Through":[165],"analysis":[168],"performance":[170],"analysis,":[171],"it":[172],"is":[173],"shown":[174],"that":[175],"our":[176],"be":[179],"suitable":[181],"for":[182],"delay-sensitive":[183],"IoT":[184],"SIN":[188],"while":[189],"ensuring":[190],"higher":[191],"security.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
