Affiliation:
1. Institute of Applied Mathematics and Mechanics, Cybersecurity Department
Abstract
The Internet of Things may include sensors, actuators, analyzers, logical controllers, which together form distributed network of heterogeneous devices. Group-based approach to authentication may be relevant when the number of nodes is very large and there are constrained devices among them. Post-quantum schemes as candidates in NIST competition are considered. Lattices are chosen as best candidates for building group-oriented schemes for IoT due to high performance, relatively small key sizes, well researched mathematical problem. To give flexibility to the lattice-based group-oriented authentication protocols, the basis delegation mechanism was considered as an approach that takes into account the hierarchy in the Internet of Things systems.
Publisher
Belarusian State University
Subject
Mathematical Physics,Statistical and Nonlinear Physics
Reference28 articles.
1. Y. Desmedt, in Conference on the Theory and Application of Cryptographic Techniques (Springer, 1987), pp. 120–127.
2. Y. Desmedt and Y. Frankel, in Annual International Cryptology Conference (Springer, 1991), pp. 457–469.
3. D. Chaum and E. Van Heyst, in Workshop on the Theory and Application of of Cryptographic Techniques (Springer, 1991), pp. 257–265.
4. R. L. Rivest, A. Shamir, and Y. Tauman, in International Conference on the Theory and Application of Cryptology and Information Security (Springer, 2001), pp. 552–565.
5. L. Malina, J. Hajny, P. Dzurenda, and S. Ricci, in ICETE (2) (2018), pp. 692–697.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献