Publication: A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules
| dc.authorscopusid | 57212212152 | |
| dc.authorscopusid | 15833929800 | |
| dc.authorwosid | Seyhan, Kübra/Iyj-3199-2023 | |
| dc.authorwosid | Akleylek, Sedat/D-2090-2015 | |
| dc.contributor.author | Seyhan, Kubra | |
| dc.contributor.author | Akleylek, Sedat | |
| dc.contributor.authorID | Seyhan, Kübra/0000-0002-0902-1903 | |
| dc.contributor.authorID | Akleylek, Sedat/0000-0001-7005-6489 | |
| dc.date.accessioned | 2025-12-11T01:13:27Z | |
| dc.date.issued | 2025 | |
| dc.department | Ondokuz Mayıs Üniversitesi | en_US |
| dc.department-temp | [Seyhan, Kubra] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, Tartu, Estonia | en_US |
| dc.description | Seyhan, Kübra/0000-0002-0902-1903; Akleylek, Sedat/0000-0001-7005-6489 | en_US |
| dc.description.abstract | With the proposal of Shor algorithm, a new era has been started for the security of public-key cryptography. In the presence of large-scale quantum computers, it was proved that some computationally hard problems, such as discrete logarithm and factorization, will be solved, so public-key primitives will be insecure. Password-authenticated key exchange (PAKE) schemes whose security is generally defined under discrete logarithm problem have also been affected due to this ongoing process. To obtain a post-quantum secure PAKE scheme, lattice-based structures come to the fore due to the strong security guarantees and efficient solutions. In this paper, we compare three currently proposed Diffie-Hellman (DH)-like lattice-based PAKE schemes that were constructed based on module structure to provide guidance about efficient password-based authentication with lattice assumptions. By giving the algorithmic explanation of selected PAKEs, we deeply analyze proposed ideas according to the component-wise comparison in terms of reconciliation structure, hard lattice problem, and design idea. The implementation results of selected PAKEs are analyzed in terms of running time and computational costs. According to the experimental results, Kyber.PAKE gives the best performance in high security levels by considering execution time. | en_US |
| dc.description.sponsorship | Estonian Research Council [PRG946] | en_US |
| dc.description.sponsorship | The second author was supported by the Estonian Research Council Grant PRG946. | en_US |
| dc.description.woscitationindex | Conference Proceedings Citation Index - Science | |
| dc.identifier.doi | 10.1007/978-3-031-73417-5_8 | |
| dc.identifier.endpage | 105 | en_US |
| dc.identifier.isbn | 9783031734168 | |
| dc.identifier.isbn | 9783031734175 | |
| dc.identifier.issn | 1865-0929 | |
| dc.identifier.issn | 1865-0937 | |
| dc.identifier.scopus | 2-s2.0-85208038532 | |
| dc.identifier.scopusquality | Q4 | |
| dc.identifier.startpage | 91 | en_US |
| dc.identifier.uri | https://doi.org/10.1007/978-3-031-73417-5_8 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12712/42121 | |
| dc.identifier.volume | 2225 | en_US |
| dc.identifier.wos | WOS:001436937600008 | |
| dc.language.iso | en | en_US |
| dc.publisher | Springer International Publishing Ag | en_US |
| dc.relation.ispartof | Communications in Computer and Information Science | en_US |
| dc.relation.ispartofseries | Communications in Computer and Information Science | |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | Post-Quantum Cryptography | en_US |
| dc.subject | Lattice-Based Cryptography | en_US |
| dc.subject | Password Authenticated Key Exchange | en_US |
| dc.subject | Reconciliation | en_US |
| dc.subject | Module Learning With Rounding | en_US |
| dc.subject | Module Learning With Errors | en_US |
| dc.title | A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication |
