Publication Type : Conference Paper
Publisher : Springer Nature Singapore
Source : Lecture Notes in Electrical Engineering
Url : https://doi.org/10.1007/978-981-99-9235-5_10
Campus : Faridabad
School : School of Artificial Intelligence
Year : 2024
Abstract : Firstly, we know that the RSA/Discrete Logarithm assumptions don’t support devices with low computing. The factorization with discrete logarithm assumption uses only simple algebraic operations such as matrix multiplications, vector-matrix multiplications, and scalar matrix multiplications. Secondly, even if we’re still years away from having real quantum computers their ability is a significant threat to the cryptographic community. Therefore, we must be ready for future threats and computation complexity for low computing devices. In this article, we have introduced an advanced password-based anonymous authenticated exchange of keys protocol over a group ring structure over a non-commutative semigroup. As far as we are aware, this is the first authenticated exchange of keys protocol over a group ring structure over a non-commutative semigroup. The safety depends upon the toughness of factoring utilizing discrete logarithm assumption. Additionally, we analyzed both the complexity and security of the proposed protocol. This scheme is very efficient and includes only simple algebraic operations, matrix additions, and multiplications.
Cite this Research Publication : Dharminder Chaudhary, G. Senthamizh, K. P. Sreekutty, A Three-Factor Authenticated Mobile Key Exchange Protocol Using Matrices Over Group Ring Structure, Lecture Notes in Electrical Engineering, Springer Nature Singapore, 2024, https://doi.org/10.1007/978-981-99-9235-5_10