Publication:
A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules

dc.authorscopusid57212212152
dc.authorscopusid15833929800
dc.authorwosidSeyhan, Kübra/Iyj-3199-2023
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.contributor.authorSeyhan, Kubra
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorIDSeyhan, Kübra/0000-0002-0902-1903
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.date.accessioned2025-12-11T01:13:27Z
dc.date.issued2025
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Seyhan, Kubra] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Tartu, Estoniaen_US
dc.descriptionSeyhan, Kübra/0000-0002-0902-1903; Akleylek, Sedat/0000-0001-7005-6489en_US
dc.description.abstractWith the proposal of Shor algorithm, a new era has been started for the security of public-key cryptography. In the presence of large-scale quantum computers, it was proved that some computationally hard problems, such as discrete logarithm and factorization, will be solved, so public-key primitives will be insecure. Password-authenticated key exchange (PAKE) schemes whose security is generally defined under discrete logarithm problem have also been affected due to this ongoing process. To obtain a post-quantum secure PAKE scheme, lattice-based structures come to the fore due to the strong security guarantees and efficient solutions. In this paper, we compare three currently proposed Diffie-Hellman (DH)-like lattice-based PAKE schemes that were constructed based on module structure to provide guidance about efficient password-based authentication with lattice assumptions. By giving the algorithmic explanation of selected PAKEs, we deeply analyze proposed ideas according to the component-wise comparison in terms of reconciliation structure, hard lattice problem, and design idea. The implementation results of selected PAKEs are analyzed in terms of running time and computational costs. According to the experimental results, Kyber.PAKE gives the best performance in high security levels by considering execution time.en_US
dc.description.sponsorshipEstonian Research Council [PRG946]en_US
dc.description.sponsorshipThe second author was supported by the Estonian Research Council Grant PRG946.en_US
dc.description.woscitationindexConference Proceedings Citation Index - Science
dc.identifier.doi10.1007/978-3-031-73417-5_8
dc.identifier.endpage105en_US
dc.identifier.isbn9783031734168
dc.identifier.isbn9783031734175
dc.identifier.issn1865-0929
dc.identifier.issn1865-0937
dc.identifier.scopus2-s2.0-85208038532
dc.identifier.scopusqualityQ4
dc.identifier.startpage91en_US
dc.identifier.urihttps://doi.org/10.1007/978-3-031-73417-5_8
dc.identifier.urihttps://hdl.handle.net/20.500.12712/42121
dc.identifier.volume2225en_US
dc.identifier.wosWOS:001436937600008
dc.language.isoenen_US
dc.publisherSpringer International Publishing Agen_US
dc.relation.ispartofCommunications in Computer and Information Scienceen_US
dc.relation.ispartofseriesCommunications in Computer and Information Science
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectLattice-Based Cryptographyen_US
dc.subjectPassword Authenticated Key Exchangeen_US
dc.subjectReconciliationen_US
dc.subjectModule Learning With Roundingen_US
dc.subjectModule Learning With Errorsen_US
dc.titleA Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modulesen_US
dc.typeConference Objecten_US
dspace.entity.typePublication

Files