{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T22:57:55Z","timestamp":1776725875374,"version":"3.51.2"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T00:00:00Z","timestamp":1729036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11227-024-06467-1","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T04:02:03Z","timestamp":1729051323000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Design and analysis of a post-quantum secure three party authenticated key agreement protocol based on ring learning with error for mobile device"],"prefix":"10.1007","volume":"81","author":[{"given":"Uddeshaya","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Manish","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Dharminder","family":"Chaudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,16]]},"reference":[{"issue":"6","key":"6467_CR1","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"6467_CR2","doi-asserted-by":"publisher","first-page":"2073","DOI":"10.1007\/s11071-016-3171-9","volume":"87","author":"CM Chen","year":"2017","unstructured":"Chen CM, Fang W, Wang KH, Wu TY (2017) Comments on \u201can improved secure and efficient password and chaos-based two-party key agreement protocol\". Nonlinear Dyn 87:2073\u20132075","journal-title":"Nonlinear Dyn"},{"key":"6467_CR3","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1007\/s11071-014-1584-x","volume":"78","author":"SKH Islam","year":"2014","unstructured":"Islam SKH (2014) Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn 78:2261\u20132276","journal-title":"Nonlinear Dyn"},{"key":"6467_CR4","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11071-015-2506-2","volume":"84","author":"Y Liu","year":"2016","unstructured":"Liu Y, Xue K (2016) An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn 84:549\u2013557","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"6467_CR5","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1016\/j.ins.2011.07.015","volume":"184","author":"J Zhao","year":"2012","unstructured":"Zhao J, Gu D (2012) Provably secure three-party password-based authenticated key exchange protocol. Inf Sci 184(1):310\u2013323","journal-title":"Inf Sci"},{"key":"6467_CR6","unstructured":"Bellovin SM, Merritt M (1992) Encrypted key exchange: password-based protocols secure against dictionary attacks. In: Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp 72\u201384"},{"key":"6467_CR7","doi-asserted-by":"publisher","first-page":"1209","DOI":"10.1007\/s11071-015-1937-0","volume":"80","author":"X Li","year":"2015","unstructured":"Li X, Niu J, Kumari S, Khan MK, Liao J, Liang W (2015) Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dyn 80:1209\u20131220","journal-title":"Nonlinear Dyn"},{"key":"6467_CR8","unstructured":"Gong L (1995) Optimal authentification protocols resistant to password guessing attacks. In: Proceedings The Eighth IEEE Computer Security Foundations Workshop, pp 24\u201329, IEEE"},{"issue":"5","key":"6467_CR9","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1109\/49.223865","volume":"11","author":"L Gong","year":"1993","unstructured":"Gong L, Lomas MA, Needham RM, Saltzer JH (1993) Protecting poorly chosen secrets from guessing attacks. IEEE J Sel Areas Commun 11(5):648\u2013656","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"6467_CR10","first-page":"120","volume":"7","author":"WS Juang","year":"2008","unstructured":"Juang WS, Wu JL (2008) Efficient user authentication and key agreement with user privacy protection. Int J Netw Secur 7(1):120\u2013129","journal-title":"Int J Netw Secur"},{"issue":"7","key":"6467_CR11","first-page":"991","volume":"82","author":"T Kwon","year":"1999","unstructured":"Kwon T, Kang M, Jung S, Song J (1999) An improvement of the password-based authentication protocol (k1p) on security against replay attacks. IEICE Trans Commun 82(7):991\u2013997","journal-title":"IEICE Trans Commun"},{"issue":"1","key":"6467_CR12","first-page":"17","volume":"11","author":"Z Yong","year":"2010","unstructured":"Yong Z, Jianfeng M, Moon S (2010) An improvement on a three-party password-based key exchange protocol using weil pairing. Int J Netw Secur 11(1):17\u201322","journal-title":"Int J Netw Secur"},{"issue":"12","key":"6467_CR13","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/4234.974498","volume":"5","author":"CL Lin","year":"2001","unstructured":"Lin CL, Sun HM, Steiner M, Hwang T (2001) Three-party encrypted key exchange without server public-keys. IEEE Commun Lett 5(12):497\u2013499","journal-title":"IEEE Commun Lett"},{"issue":"4","key":"6467_CR14","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/506106.506108","volume":"34","author":"CL Lin","year":"2000","unstructured":"Lin CL, Sun HM, Hwang T (2000) Three-party encrypted key exchange: attacks and a solution. ACM SIGOPS Oper Syst Rev 34(4):12\u201320","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"4","key":"6467_CR15","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y Ding","year":"1995","unstructured":"Ding Y, Horster P (1995) Undetectable on-line password guessing attacks. ACM SIGOPS Oper Syst Rev 29(4):77\u201386","journal-title":"ACM SIGOPS Oper Syst Rev"},{"issue":"7","key":"6467_CR16","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.cose.2004.06.007","volume":"23","author":"TF Lee","year":"2004","unstructured":"Lee TF, Hwang T, Lin CL (2004) Enhanced three-party encrypted key exchange without server public keys. Comput Secur 23(7):571\u2013577","journal-title":"Comput Secur"},{"issue":"1\u20132","key":"6467_CR17","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jss.2003.11.017","volume":"75","author":"HM Sun","year":"2005","unstructured":"Sun HM, Chen BC, Hwang T (2005) Secure key agreement protocols for three-party against guessing attacks. J Syst Softw 75(1\u20132):63\u201368","journal-title":"J Syst Softw"},{"key":"6467_CR18","unstructured":"Xu D, He D, Choo KMR, Chen J (2017) Provably secure three-party password authenticated key exchange protocol based on ring learning with error. Cryptology ePrint Archive, pp 2017\/360. https:\/\/eprint.iacr.org\/2017\/360"},{"key":"6467_CR19","doi-asserted-by":"publisher","first-page":"2055","DOI":"10.1007\/s13369-013-0575-4","volume":"38","author":"D He","year":"2013","unstructured":"He D, Chen Y, Chen J (2013) An id-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Arab J Sci Eng 38:2055\u20132061","journal-title":"Arab J Sci Eng"},{"key":"6467_CR20","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s11071-014-1304-6","volume":"77","author":"MS Farash","year":"2014","unstructured":"Farash MS, Attari MA (2014) An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn 77:399\u2013411","journal-title":"Nonlinear Dyn"},{"key":"6467_CR21","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1007\/s11071-014-1827-x","volume":"79","author":"CC Lee","year":"2015","unstructured":"Lee CC, Li CT, Chiu ST, Lai YM (2015) A new three-party-authenticated key agreement scheme based on chaotic maps without password table. Nonlinear Dyn 79:2485\u20132495","journal-title":"Nonlinear Dyn"},{"key":"6467_CR22","doi-asserted-by":"publisher","first-page":"66150","DOI":"10.1109\/ACCESS.2020.2979251","volume":"8","author":"Y Zheng","year":"2020","unstructured":"Zheng Y, Hu S, Wei L, Chen Y, Wang H, Yang Y, Li Y, Xu B, Huang W, Chen L (2020) Design and analysis of a security-enhanced three-party authenticated key agreement protocol based on chaotic maps. IEEE Access 8:66150\u201366162","journal-title":"IEEE Access"},{"key":"6467_CR23","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2015.03.050","volume":"312","author":"SKH Islam","year":"2015","unstructured":"Islam SKH (2015) Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps. Inf Sci 312:104\u2013130","journal-title":"Inf Sci"},{"issue":"3","key":"6467_CR24","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.jksus.2017.01.003","volume":"29","author":"SKH Islam","year":"2017","unstructured":"Islam SKH, Amin R, Biswas GP, Farash MS, Li X, Kumari S (2017) An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J King Saud Univ Comput Inf Sci 29(3):311\u2013324","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"10","key":"6467_CR25","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0203984","volume":"13","author":"Q Xie","year":"2018","unstructured":"Xie Q, Lu Y, Tan X, Tang Z, Hu B (2018) Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps. PLoS ONE 13(10):e0203984","journal-title":"PLoS ONE"},{"key":"6467_CR26","volume":"63","author":"SKH Islam","year":"2021","unstructured":"Islam SKH, Basu S (2021) Pb-3paka: Password-based three-party authenticated key agreement protocol for mobile devices in post-quantum environments. J Inf Secur Appl 63:103026","journal-title":"J Inf Secur Appl"},{"key":"6467_CR27","doi-asserted-by":"crossref","unstructured":"Chaudhary D, Kumar U, Saleem K (2023) A construction of three party post quantum secure authenticated key exchange using ring learning with errors and ECC Cryptography. IEEE Access IEEE","DOI":"10.1109\/ACCESS.2023.3325886"},{"key":"6467_CR28","doi-asserted-by":"crossref","unstructured":"Kumar U, Pal Y, Nikhil S, Garg M, Kumar R, Chaudhary D (2023) A construction of three party post quantum secure authenticated key exchange for mobile users. In: 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) IEEE 1\u20137","DOI":"10.1109\/ICCCNT56998.2023.10306940"},{"key":"6467_CR29","volume":"75","author":"P Rewal","year":"2023","unstructured":"Rewal P, Singh M, Mishra D, Pursharthi K, Mishra A (2023) Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. J Inf Secur Appl 75:103505","journal-title":"J Inf Secur Appl"},{"key":"6467_CR30","volume":"84","author":"V Dabra","year":"2024","unstructured":"Dabra V, Kumari S, Bala A, Yadav S (2024) SL3PAKE: simple lattice-based three-party password authenticated key exchange for post-quantum world. J Inf Secur Appl 84:103826","journal-title":"J Inf Secur Appl"},{"key":"6467_CR31","doi-asserted-by":"crossref","unstructured":"Chaudhary D, Dadsena K, Padmavathi A, Hassan M, Alkhamees F, Kumar U (2024) Anonymous quantum safe construction of three party authentication and key agreement protocol for mobile devices. IEEE Access IEEE","DOI":"10.1109\/ACCESS.2024.3404232"},{"issue":"1","key":"6467_CR32","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1137\/S0097539705447360","volume":"37","author":"D Micciancio","year":"2007","unstructured":"Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267\u2013302","journal-title":"SIAM J Comput"},{"key":"6467_CR33","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Ding J, Snook M, Dagdelen \u00d6 (2015) Authenticated key exchange from ideal lattices. In Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II 34, pp 719\u2013751, Springer","DOI":"10.1007\/978-3-662-46803-6_24"},{"key":"6467_CR34","doi-asserted-by":"crossref","unstructured":"Ding J, Alsayigh S, Lancrenon J, Saraswathy RV, Snook M (2017) Provably secure password authenticated key exchange based on rlwe for the post-quantum world. In Topics in Cryptology\u2013CT-RSA 2017: The Cryptographers\u2019 Track at the RSA Conference 2017, San Francisco, CA, USA, February 14\u201317, 2017, Proceedings pp 183\u2013204, Springer","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"6467_CR35","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings 29 pp 1\u201323, Springer","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"6467_CR36","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.compeleceng.2018.01.028","volume":"69","author":"G Panchal","year":"2018","unstructured":"Panchal G, Samanta D (2018) A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security. Comput Electr Eng 69:461\u2013478","journal-title":"Comput Electr Eng"},{"issue":"2","key":"6467_CR37","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198\u2013208","journal-title":"IEEE Trans Inf Theory"},{"key":"6467_CR38","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s13389-011-0006-y","volume":"1","author":"P Kocher","year":"2011","unstructured":"Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1:5\u201327","journal-title":"J Cryptogr Eng"},{"issue":"2","key":"6467_CR39","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BF00124891","volume":"2","author":"W Whitfield Diffie","year":"1992","unstructured":"Whitfield Diffie W, Oorschot PCV, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2(2):107\u2013125","journal-title":"Des Codes Crypt"},{"issue":"4","key":"6467_CR40","doi-asserted-by":"publisher","first-page":"5067","DOI":"10.1109\/JSYST.2020.3023808","volume":"15","author":"V Dabra","year":"2020","unstructured":"Dabra V, Bala A, Kumari S (2020) Lba-pake: Lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Syst J 15(4):5067\u20135077","journal-title":"IEEE Syst J"},{"key":"6467_CR41","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1007\/s11071-014-1388-z","volume":"77","author":"H Lai","year":"2014","unstructured":"Lai H, Orgun MA, Xiao J, Pieprzyk J, Xue L, Yang Y (2014) Provably secure three-party key agreement protocol using chebyshev chaotic maps in the standard model. Nonlinear Dyn 77:1427\u20131439","journal-title":"Nonlinear Dyn"},{"key":"6467_CR42","doi-asserted-by":"publisher","first-page":"25893","DOI":"10.1007\/s11042-017-4701-2","volume":"76","author":"N Doshi","year":"2017","unstructured":"Doshi N, Kumari S, Mishra D, Li X, Choo KKR, Sangaiah AK (2017) A password based authentication scheme for wireless multimedia systems. Multimed Tools Appl 76:25893\u201325918","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"6467_CR43","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/JSYST.2018.2851295","volume":"13","author":"Q Feng","year":"2018","unstructured":"Feng Q, He D, Zeadally S, Kumar N, Liang K (2018) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775\u20132785","journal-title":"IEEE Syst J"},{"key":"6467_CR44","doi-asserted-by":"crossref","unstructured":"Melchor CA, Barrier J, Guelton S, Guinet A, Killijian MO, Lepoint T (2016) Nfllib: Ntt-based fast lattice library. In Topics in Cryptology-CT-RSA 2016: The Cryptographers\u2019 Track at the RSA Conference 2016, San Francisco, CA, USA, February 29-March 4, 2016, Proceedings pp 341\u2013356, Springer","DOI":"10.1007\/978-3-319-29485-8_20"},{"key":"6467_CR45","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.comnet.2013.08.020","volume":"58","author":"H Yang","year":"2014","unstructured":"Yang H, Zhang Y, Zhou Y, Fu X, Liu H, Vasilakos AV (2014) Provably secure three-party authenticated key agreement protocol using smart cards. Comput Netw 58:29\u201338","journal-title":"Comput Netw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06467-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06467-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06467-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T04:06:44Z","timestamp":1729051604000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06467-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,16]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["6467"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06467-1","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,16]]},"assertion":[{"value":"7 October 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 October 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"9"}}