Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges

计算机科学 钥匙(锁) 认证(法律) 开放式研究 计算机安全 物联网 万维网
作者
Ponnuru Raveendra Babu,Sathish Kumar,Alavalapati Goutham Reddy,Ashok Kumar Das
出处
期刊:Computer Science Review [Elsevier]
卷期号:54: 100676-100676
标识
DOI:10.1016/j.cosrev.2024.100676
摘要

This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication. • We present the evolution of post-quantum cryptography, it's impact on classical cryptography, the migration from classical cryptography to post-quantum cryptography, and security attacks and services. • A taxonomy and comprehensive comparison study of quantum-resistant authentication and key agreement protocols IoT enabled applications is presented. • Furthermore, we evaluate suitable protocols in terms of computation overhead and security features. Lastly, some potential future directions and challenges linked to quantum-resistant authentication and key agreement protocols are discussed.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
GD完成签到,获得积分10
刚刚
max2024关注了科研通微信公众号
刚刚
在水一方应助漂亮送终采纳,获得10
1秒前
橘子完成签到,获得积分10
1秒前
1秒前
我又帅又红又专完成签到,获得积分20
1秒前
我爱科研完成签到,获得积分10
1秒前
背后广山发布了新的文献求助10
2秒前
123发布了新的文献求助30
2秒前
Yan完成签到,获得积分10
3秒前
迪迦发布了新的文献求助10
4秒前
4秒前
orixero应助种花家的狗狗采纳,获得10
5秒前
yiqichihuoguoa完成签到 ,获得积分10
5秒前
fhehe完成签到,获得积分20
6秒前
6秒前
盐坚果完成签到,获得积分10
6秒前
7秒前
7秒前
zhu96114748完成签到,获得积分10
7秒前
8秒前
星辰大海应助叮叮爱吃糖采纳,获得10
9秒前
9秒前
9秒前
盐坚果发布了新的文献求助10
10秒前
ivy0425发布了新的文献求助10
11秒前
11秒前
11秒前
11秒前
bingbing完成签到,获得积分10
12秒前
12秒前
是小雨呀完成签到,获得积分10
12秒前
13秒前
ELend完成签到,获得积分10
13秒前
14秒前
迷路荷花发布了新的文献求助10
14秒前
zzz发布了新的文献求助10
15秒前
15秒前
15秒前
jerry发布了新的文献求助10
15秒前
高分求助中
Sustainability in Tides Chemistry 2800
The Young builders of New china : the visit of the delegation of the WFDY to the Chinese People's Republic 1000
Rechtsphilosophie 1000
Bayesian Models of Cognition:Reverse Engineering the Mind 888
Le dégorgement réflexe des Acridiens 800
Defense against predation 800
Very-high-order BVD Schemes Using β-variable THINC Method 568
热门求助领域 (近24小时)
化学 医学 生物 材料科学 工程类 有机化学 生物化学 物理 内科学 纳米技术 计算机科学 化学工程 复合材料 基因 遗传学 催化作用 物理化学 免疫学 量子力学 细胞生物学
热门帖子
关注 科研通微信公众号,转发送积分 3135702
求助须知:如何正确求助?哪些是违规求助? 2786585
关于积分的说明 7778267
捐赠科研通 2442686
什么是DOI,文献DOI怎么找? 1298616
科研通“疑难数据库(出版商)”最低求助积分说明 625205
版权声明 600866