Publication:
MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication

dc.authorscopusid57201814657
dc.authorscopusid57212212152
dc.authorscopusid43561144600
dc.authorscopusid15833929800
dc.authorwosidSeyhan, Kübra/Iyj-3199-2023
dc.authorwosidAkleylek, Sedat/D-2090-2015
dc.contributor.authorBasu, Swagatam
dc.contributor.authorSeyhan, Kubra
dc.contributor.authorIslam, S. K. Hafizul
dc.contributor.authorAkleylek, Sedat
dc.contributor.authorIDSeyhan, Kübra/0000-0002-0902-1903
dc.contributor.authorIDBasu, Swagatam/0000-0002-0623-1171
dc.contributor.authorIDAkleylek, Sedat/0000-0001-7005-6489
dc.date.accessioned2025-12-11T01:24:34Z
dc.date.issued2023
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Basu, Swagatam] Inst Engn & Management, Dept Informat Technol, Kolkata 700091, India; [Basu, Swagatam; Islam, S. K. Hafizul] Indian Inst Informat Technol, Dept Comp Sci & Engn, Kalyani, India; [Seyhan, Kubra; Akleylek, Sedat] Ondokuz Mayis Univ, Dept Comp Engn, Samsun, Turkiye; [Akleylek, Sedat] Univ Tartu, EE-50090 Tartu, Estoniaen_US
dc.descriptionSeyhan, Kübra/0000-0002-0902-1903; Basu, Swagatam/0000-0002-0623-1171; Akleylek, Sedat/0000-0001-7005-6489en_US
dc.description.abstractThe two-party authenticated key agreement (2PAKA) protocol allows two users to generate a shared session key between themselves over a public channel without any assistance from a centralized server. Many of the state-of-the-art 2PAKA protocols are not secure in quantum environments. This article proposes a hybrid module learning with rounding (MLWR)-based 2PAKA (MLWR-2PAKA) protocol for the post-quantum world. The constructed MLWR-2PAKA protocol provides entity authentication based on the Saber scheme. The hardness assumption of MLWR-2PAKA relies on MLWR since it does not require any complex reduction and sampling processes. The security analysis is done in the random oracle model based on the basic Dolev-Yao threat model. In addition, the chosen reconciliation structure makes the session keys unbiased. By using different parameter sets, a comparison analysis is presented regarding key sizes, failure probability, and bandwidth requirements.en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.doi10.1109/JSYST.2023.3288629
dc.identifier.endpage6103en_US
dc.identifier.issn1932-8184
dc.identifier.issn1937-9234
dc.identifier.issue4en_US
dc.identifier.scopus2-s2.0-85165300952
dc.identifier.scopusqualityQ1
dc.identifier.startpage6093en_US
dc.identifier.urihttps://doi.org/10.1109/JSYST.2023.3288629
dc.identifier.urihttps://hdl.handle.net/20.500.12712/43509
dc.identifier.volume17en_US
dc.identifier.wosWOS:001035838500001
dc.identifier.wosqualityQ1
dc.language.isoenen_US
dc.publisherIEEE-inst Electrical Electronics Engineers incen_US
dc.relation.ispartofIEEE Systems Journalen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAuthenticated Key Agreement (AKA)en_US
dc.subjectLattice-Based Cryptographyen_US
dc.subjectModule Learning With Rounding (MLWR)en_US
dc.subjectPost-Quantum Cryptographyen_US
dc.subjectRandom Oracle Modelen_US
dc.titleMLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communicationen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files