浏览全部资源
扫码关注微信
1.重庆邮电大学通信与信息工程学院,重庆 400065
2.重庆邮电大学网络空间安全与信息法学院,重庆 400065
[ "王杉杉(1996- ),女,重庆人,重庆邮电大学博士生,主要研究方向为天地一体化网络安全。" ]
[ "赵国锋(1972- ),男,陕西西安人,博士,重庆邮电大学教授、博士生导师,主要研究方向为天地一体化网络体系结构、工业物联网、网络安全。" ]
[ "徐川(1980- ),男,重庆人,博士,重庆邮电大学教授、博士生导师,主要研究方向为网络体系结构、网络安全、网络建模。" ]
[ "韩珍珍(1989- ),女,河南商丘人,博士,重庆邮电大学讲师,主要研究方向为天地一体化网络体系结构、跨层路由、网络安全。" ]
收稿日期:2024-07-02,
修回日期:2024-09-24,
纸质出版日期:2024-10-25
移动端阅览
王杉杉,赵国锋,徐川等.基于格的卫星网络轻量化后量子接入认证方案[J].通信学报,2024,45(10):17-30.
WANG Shanshan,ZHAO Guofeng,XU Chuan,et al.Lattice-based lightweight post quantum access authentication scheme for satellite network[J].Journal on Communications,2024,45(10):17-30.
王杉杉,赵国锋,徐川等.基于格的卫星网络轻量化后量子接入认证方案[J].通信学报,2024,45(10):17-30. DOI: 10.11959/j.issn.1000-436x.2024180.
WANG Shanshan,ZHAO Guofeng,XU Chuan,et al.Lattice-based lightweight post quantum access authentication scheme for satellite network[J].Journal on Communications,2024,45(10):17-30. DOI: 10.11959/j.issn.1000-436x.2024180.
针对卫星网络的接入认证方案存在量子计算攻击,认证开销大和交互时间长的问题,提出了一种基于格的卫星网络轻量化后量子接入认证方案。在注册阶段,基于近似最短向量问题(SVP)的格密码哈希函数对用户身份进行保密,降低该阶段的计算时间并完成身份注册;在认证阶段,基于盆景树算法设计低维模乘模加的双向认证算法,将其算法复杂度从平方级降至线性级,进一步减少认证过程中的通信开销和卫星上的计算开销。理论证明,所提方案能够抵御量子计算攻击,性能分析表明,与格密码认证方案相比,所提方案至少减少150%的认证时间。
Aiming at the problems of quantum computing attacks
high authentication overhead and long interaction time in satellite network access authentication schemes
a lightweight post quantum access authentication scheme based on lattice for a satellite network was proposed. In the registration phase
a lattice Hash function based on the approximate shortest vector problem (SVP) was used to keep the user's identity confidential
which reduced the computation time and completes identity registration. In the authentication phase
a low dimensional modular multiplication modular addition mutual authentication algorithm was designed based on the bonsai tree algorithm
which reduced the algorithm complexity from the quadratic level to the linear level
further decreasing the communication costs during the authentication process and computational costs on satellite. Theoretical proof and performance analysis show that the scheme resists quantum computing attacks and reduces authentication time by at least 150% compared to lattice authentication schemes.
蒋长林 , 李清 , 王羽 , 等 . 天地一体化网络关键技术研究综述 [J ] . 软件学报 , 2024 , 35 ( 1 ): 266 - 287 .
JIANG C L , LI Q , WANG Y , et al . Survey on key technologies in space-ground integrated network [J ] . Journal of Software , 2024 , 35 ( 1 ): 266 - 287 .
徐国愚 , 徐刚 , 姜涛 , 等 . 天地一体化网络认证机制性能定量分析方法 [J ] . 计算机工程与应用 , 2020 , 56 ( 21 ): 108 - 114 .
XU G Y , XU G , JIANG T , et al . Research on quantitative analysis of authentication mechanism performance for space-ground integrated information network [J ] . Computer Engineering and Applications , 2020 , 56 ( 21 ): 108 - 114 .
XUE K P , MENG W , LI S H , et al . A secure and efficient access and handover authentication protocol for Internet of Things in space information networks [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 3 ): 5485 - 5499 .
CHEN Y R , YIN F M , HU S F , et al . ECC-based authenticated key agreement protocol for industrial control system [J ] . IEEE Internet of Things Journal , 2023 , 10 ( 6 ): 4688 - 4697 .
SHOR P W . Algorithms for quantum computation: discrete logarithms and factoring [C ] // Proceedings of the 35th Annual Symposium on Foundations of Computer Science . Piscataway : IEEE Press , 2002 : 124 - 134 .
KHAN N , ZHANG J B , ULLAH I , et al . Lattice-based authentication scheme to prevent quantum attack in public cloud environment [J ] . Computers , Materials & Continua, 2023 , 75 ( 1 ): 35 - 49 .
GULATI A , AUJLA G S , CHAUDHARY R , et al . DiLSe: lattice-based secure and dependable data dissemination scheme for social Internet of vehicles [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 18 ( 6 ): 2520 - 2534 .
LI Q R , HE D B , YANG Z C , et al . Lattice-based conditional privacy-preserving authentication protocol for the vehicular ad hoc network [J ] . IEEE Transactions on Vehicular Technology , 2022 , 71 ( 4 ): 4336 - 4347 .
MA R H , CAO J , FENG D G , et al . LAA: lattice-based access authentication scheme for IoT in space information networks [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 4 ): 2791 - 2805 .
GUO J Y , DU Y , WU X S , et al . An anti-quantum authentication protocol for space information networks based on ring learning with errors [J ] . Journal of Communications and Information Networks , 2021 , 6 ( 3 ): 301 - 311 .
KUMAR U , GARG M . Learning with error-based key agreement and authentication scheme for satellite communication [J ] . International Journal of Satellite Communications and Networking , 2022 , 40 ( 2 ): 83 - 95 .
GUO J Y , DU Y . A novel RLWE-based anonymous mutual authentication protocol for space information network [J ] . Security and Communication Networks , 2020 , 6 : 1 - 12 .
LI Q R , LUO M , HSU C , et al . A quantum secure and noninteractive identity-based aggregate signature protocol from lattices [J ] . IEEE Systems Journal , 2022 , 16 ( 3 ): 4816 - 4826 .
SHIM K A . A survey on post-quantum public-key signature schemes for secure vehicular communications [J ] . IEEE Transactions on Intelligent Transportation Systems , 2022 , 23 ( 9 ): 14025 - 14042 .
WANG F H , WANG J Q , SHI S Q . Efficient data sharing with privacy preservation over lattices for secure cloud storage [J ] . IEEE Systems Journal , 2022 , 16 ( 2 ): 2507 - 2517 .
KARABULUT E , ALKIM E , AYSU A. Efficient , flexible , and constant-time Gaussian sampling hardware for lattice cryptography [J ] . IEEE Transactions on Computers , 2022 , 71 ( 8 ): 1810 - 1823 .
GUPTA D S , ISLAM S H , OBAIDAT M S , et al . LAAC: lightweight lattice-based authentication and access control protocol for E-health systems in IoT environments [J ] . IEEE Systems Journal , 2021 , 15 ( 3 ): 3620 - 3627 .
GUPTA D S , KARATI A , SAAD W , et al . Quantum-defended blockchain-assisted data authentication protocol for Internet of vehicles [J ] . IEEE Transactions on Vehicular Technology , 2022 , 71 ( 3 ): 3255 - 3266 .
CASH D , HOFHEINZ D , KILTZ E , et al . Bonsai trees, or how to delegate a lattice basis [C ] // Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques . Berlin : Springer , 2010 : 523 - 552 .
CAO Y B , XU S Y , CHEN X , et al . A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios [J ] . Computer Networks , 2022 , 214 : 109 - 149 .
LYUBASHEVSKY V , MICCIANCIO D . Asymptotically efficient lattice-based digital signatures [C ] // Theory of Cryptography Conference . Berlin : Springer , 2008 : 37 - 54 .
0
浏览量
53
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构