{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T03:32:40Z","timestamp":1768534360039,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T00:00:00Z","timestamp":1740614400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T00:00:00Z","timestamp":1740614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01937-6","type":"journal-article","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T14:07:19Z","timestamp":1740751639000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Cryptanalysis and amendment of authenticated key exchange protocol for mobile devices"],"prefix":"10.1007","volume":"18","author":[{"given":"Komal","family":"Pursharthi","sequence":"first","affiliation":[]},{"given":"Dheerendra","family":"Mishra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,27]]},"reference":[{"key":"1937_CR1","doi-asserted-by":"crossref","unstructured":"Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th annual symposium on foundations of computer science. Ieee, pp 124\u2013134","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1937_CR2","doi-asserted-by":"crossref","unstructured":"Ghahramani M, Javidan R (2021) A robust anonymous remote user authentication protocol for iot services. Wireless Pers Commun 121(3):2347\u20132369","DOI":"10.1007\/s11277-021-08826-0"},{"key":"1937_CR3","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1109\/TIFS.2023.3262125","volume":"18","author":"M Ghahramani","year":"2023","unstructured":"Ghahramani M (2023) Find it with a pencil: an efficient approach for vulnerability detection in authentication protocols. IEEE Trans Inf Forensics Secur 18:2005\u20132014","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1937_CR4","doi-asserted-by":"publisher","first-page":"7559","DOI":"10.1007\/s12652-023-04557-1","volume":"14","author":"M Ghahramani","year":"2023","unstructured":"Ghahramani M, HaddadPajouh H, Javidan R, Kumari S (2023) Vqr: vulnerability analysis in quadratic residues-based authentication protocols. J Ambient Intell Humaniz Comput 14(6):7559\u20137574","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"12","key":"1937_CR5","doi-asserted-by":"publisher","first-page":"16 499","DOI":"10.1109\/TVT.2023.3292169","volume":"72","author":"D Mishra","year":"2023","unstructured":"Mishra D, Singh M, Rewal P, Pursharthi K, Kumar N, Barnawi A, Rathore RS (2023) Quantum-safe secure and authorized communication protocol for internet of drones. IEEE Trans Veh Technol 72(12):16 499-16 507","journal-title":"IEEE Trans Veh Technol"},{"key":"1937_CR6","first-page":"103754","volume":"82","author":"K Pursharthi","year":"2024","unstructured":"Pursharthi K, Mishra D (2024) Towards post-quantum authenticated key agreement scheme for mobile devices. J Inf Secur Appl 82:103754","journal-title":"J Inf Secur Appl"},{"key":"1937_CR7","first-page":"100688","volume":"44","author":"D Mishra","year":"2023","unstructured":"Mishra D, Pursharthi K, Rewal P (2023) Development of quantum-enhanced authenticated key agreement protocol for autonomous vehicles. Veh Commun 44:100688","journal-title":"Veh Commun"},{"key":"1937_CR8","first-page":"103505","volume":"75","author":"P Rewal","year":"2023","unstructured":"Rewal P, Singh M, Mishra D, Pursharthi K, Mishra A (2023) Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. J Inf Secur Appl 75:103505","journal-title":"J Inf Secur Appl"},{"key":"1937_CR9","doi-asserted-by":"crossref","unstructured":"Pursharthi K, Mishra D (2024) Post-quantum framework for authorized and secure communication in multi-server networking. Telecommunication Systems, pp 1\u201316","DOI":"10.1007\/s11235-024-01190-x"},{"key":"1937_CR10","doi-asserted-by":"publisher","first-page":"71 833","DOI":"10.1109\/ACCESS.2020.2987978","volume":"8","author":"Q Cheng","year":"2020","unstructured":"Cheng Q, Hsu C, Xia Z, Harn L (2020) Fast multivariate-polynomial-based membership authentication and key establishment for secure group communications in wsn. IEEE Access 8:71 833-71 839","journal-title":"IEEE Access"},{"key":"1937_CR11","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.tcs.2019.12.032","volume":"809","author":"J Chen","year":"2020","unstructured":"Chen J, Ning J, Ling J, Lau TSC, Wang Y (2020) A new encryption scheme for multivariate quadratic systems. Theoret Comput Sci 809:372\u2013383","journal-title":"Theoret Comput Sci"},{"issue":"4","key":"1937_CR12","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1109\/JSAC.2018.2825079","volume":"36","author":"D Chen","year":"2018","unstructured":"Chen D, Zhang N, Lu R, Fang X, Zhang K, Qin Z, Shen X (2018) An ldpc code based physical layer message authentication scheme with prefect security. IEEE J Sel Areas Commun 36(4):748\u2013761","journal-title":"IEEE J Sel Areas Commun"},{"key":"1937_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109327","volume":"217","author":"S Kumari","year":"2022","unstructured":"Kumari S, Singh M, Singh R, Tewari H (2022) A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for iot devices. Comput Netw 217:109327","journal-title":"Comput Netw"},{"issue":"1","key":"1937_CR14","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.dcan.2020.05.001","volume":"7","author":"J Wang","year":"2021","unstructured":"Wang J, Zhu Y, Maqbool S et al (2021) An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Digit Commun Netw 7(1):140\u2013150","journal-title":"Digit Commun Netw"},{"issue":"5","key":"1937_CR15","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1016\/j.sigpro.2009.05.024","volume":"90","author":"F Ahmed","year":"2010","unstructured":"Ahmed F, Siyal MY, Abbas VU (2010) A secure and robust hash-based scheme for image authentication. Signal Process 90(5):1456\u20131470","journal-title":"Signal Process"},{"key":"1937_CR16","doi-asserted-by":"crossref","unstructured":"Ajtai M (1998) The shortest vector problem in l2 is np-hard for randomized reductions. In: Proceedings of the thirtieth annual ACM symposium on theory of computing, pp 10\u201319","DOI":"10.1145\/276698.276705"},{"key":"1937_CR17","doi-asserted-by":"crossref","unstructured":"Hanrot G, Pujol X, Stehl\u00e9 D (2011) Algorithms for the shortest and closest lattice vector problems. In: International conference on coding and cryptology. Springer, pp 159\u2013190","DOI":"10.1007\/978-3-642-20901-7_10"},{"key":"1937_CR18","first-page":"1","volume":"57","author":"S Wang","year":"2014","unstructured":"Wang S, Zhu Y, Ma D, Feng R (2014) Lattice-based key exchange on small integer solution problem. Science China Inf Sci 57:1\u201312","journal-title":"Science China Inf Sci"},{"key":"1937_CR19","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Advances in cryptology\u2013EUROCRYPT 2010: 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30\u2013June 3, 2010. Proceedings 29. Springer, pp 1\u201323","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"1937_CR20","unstructured":"Ding J, Xie X, Lin X (2012) A simple provably secure key exchange scheme based on the learning with errors problem. Cryptology ePrint Archive"},{"key":"1937_CR21","unstructured":"Fluhrer S (2016) Cryptanalysis of ring-lwe based key exchange with key share reuse. Cryptology ePrint Archive"},{"key":"1937_CR22","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Ding J, Snook M, Dagdelen \u00d6 (2015) Authenticated key exchange from ideal lattices. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 719\u2013751","DOI":"10.1007\/978-3-662-46803-6_24"},{"issue":"3","key":"1937_CR23","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.1109\/JSYST.2018.2851295","volume":"13","author":"Q Feng","year":"2018","unstructured":"Feng Q, He D, Zeadally S, Kumar N, Liang K (2018) Ideal lattice-based anonymous authentication protocol for mobile devices. IEEE Syst J 13(3):2775\u20132785","journal-title":"IEEE Syst J"},{"key":"1937_CR24","doi-asserted-by":"crossref","unstructured":"Dabra V, Bala A, Kumari S (2020) Lba-pake: lattice-based anonymous password authenticated key exchange for mobile devices. IEEE Syst J","DOI":"10.1109\/JSYST.2020.3023808"},{"key":"1937_CR25","first-page":"102468","volume":"52","author":"SH Islam","year":"2020","unstructured":"Islam SH (2020) Provably secure two-party authenticated key agreement protocol for post-quantum environments. J Inf Secur Appl 52:102468","journal-title":"J Inf Secur Appl"},{"key":"1937_CR26","first-page":"102889","volume":"61","author":"V Dabra","year":"2021","unstructured":"Dabra V, Bala A, Kumari S (2021) Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments. J Inf Secur Appl 61:102889","journal-title":"J Inf Secur Appl"},{"key":"1937_CR27","doi-asserted-by":"crossref","unstructured":"Ding R, Cheng C, Qin Y (2022) Further analysis and improvements of a lattice-based anonymous pake scheme. IEEE Syst J","DOI":"10.1109\/JSYST.2022.3161264"},{"issue":"9","key":"1937_CR28","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/TIFS.2016.2573746","volume":"11","author":"D He","year":"2016","unstructured":"He D, Zeadally S, Kumar N, Wu W (2016) Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures. IEEE Trans Inf Forensics Secur 11(9):2052\u20132064","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"9","key":"1937_CR29","doi-asserted-by":"publisher","first-page":"1529","DOI":"10.1002\/dac.3126","volume":"29","author":"SH Islam","year":"2016","unstructured":"Islam SH, Obaidat MS, Amin R (2016) An anonymous and provably secure authentication scheme for mobile user. Int J Commun Syst 29(9):1529\u20131544","journal-title":"Int J Commun Syst"},{"issue":"2","key":"1937_CR30","doi-asserted-by":"publisher","first-page":"e4199","DOI":"10.1002\/ett.4199","volume":"32","author":"D Dharminder","year":"2021","unstructured":"Dharminder D (2021) Lwedm: learning with error based secure mobile digital rights management system. Trans Emerg Telecommun Technol 32(2):e4199","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"5","key":"1937_CR31","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.310","volume":"6","author":"K Pursharthi","year":"2023","unstructured":"Pursharthi K, Mishra D (2023) On the security of ring learning with error-based key exchange protocol against signal leakage attack. Security and Privacy 6(5):e310","journal-title":"Security and Privacy"},{"key":"1937_CR32","doi-asserted-by":"crossref","unstructured":"Ren P, Gu X (2022) Practical post-quantum password-authenticated key exchange based-on module-lattice. In: Information Security and Cryptology-ICISC, 2021: 24th International Conference, Seoul, South Korea, December 1\u20133, 2021, Revised Selected Papers. Springer, pp 137\u2013156","DOI":"10.1007\/978-3-031-08896-4_7"},{"key":"1937_CR33","unstructured":"Li Z, Wang D, Morais E (2020) Quantum-safe round-optimal password authentication for mobile devices. IEEE Trans Depend Secure Comput"},{"issue":"10","key":"1937_CR34","doi-asserted-by":"publisher","first-page":"4089","DOI":"10.1007\/s12652-019-01675-7","volume":"11","author":"D Dharminder","year":"2020","unstructured":"Dharminder D, Chandran KP (2020) Lwesm: learning with error based secure communication in mobile devices using fuzzy extractor. J Ambient Intell Humaniz Comput 11(10):4089\u20134100","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"1937_CR35","doi-asserted-by":"publisher","first-page":"2548","DOI":"10.1007\/s12083-023-01534-5","volume":"16","author":"B Moony","year":"2023","unstructured":"Moony B, Barnwal AK, Singh M, Mishra D (2023) Quantum secure two party authentication protocol for mobile devices. Peer-to-Peer Netw Appl 16(5):2548\u20132559","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1937_CR36","doi-asserted-by":"crossref","unstructured":"Ding J, Alsayigh S, Lancrenon J, RV S, Snook M (2017) Provably secure password authenticated key exchange based on rlwe for the post-quantum world. In: Cryptographers\u2019 Track at the RSA conference. Springer, pp 183\u2013204","DOI":"10.1007\/978-3-319-52153-4_11"},{"key":"1937_CR37","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on theory of computing, pp 197\u2013206","DOI":"10.1145\/1374376.1374407"},{"issue":"1","key":"1937_CR38","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1137\/S0097539705447360","volume":"37","author":"D Micciancio","year":"2007","unstructured":"Micciancio D, Regev O (2007) Worst-case to average-case reductions based on gaussian measures. SIAM J Comput 37(1):267\u2013302","journal-title":"SIAM J Comput"},{"issue":"6","key":"1937_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535925","volume":"60","author":"V Lyubashevsky","year":"2013","unstructured":"Lyubashevsky V, Peikert C, Regev O (2013) On ideal lattices and learning with errors over rings. J ACM (JACM) 60(6):1\u201335","journal-title":"J ACM (JACM)"},{"key":"1937_CR40","doi-asserted-by":"crossref","unstructured":"Ding J, Fluhrer S, Rv S (2018) Complete attack on rlwe key exchange with reused keys, without signal leakage. In: Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11\u201313, 2018, Proceedings 23. Springer, pp 467\u2013486","DOI":"10.1007\/978-3-319-93638-3_27"},{"key":"1937_CR41","unstructured":"Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. Cryptology eprint archive"},{"key":"1937_CR42","doi-asserted-by":"crossref","unstructured":"Zhang Q, Wu J, Zhong H, He D, Cui J (2022) Efficient anonymous authentication based on physically unclonable function in industrial internet of things. IEEE Trans Inf Forensics Secur 18:233\u2013247","DOI":"10.1109\/TIFS.2022.3218432"},{"key":"1937_CR43","doi-asserted-by":"crossref","unstructured":"Wang K, Jiang H (2019) Analysis of two countermeasures against the signal leakage attack. In: International conference on cryptology in Africa. Springer, pp 370\u2013388","DOI":"10.1007\/978-3-030-23696-0_19"},{"key":"1937_CR44","unstructured":"Microsoft (2006) Lattice cryptography library. https:\/\/github.com\/b\/LatticeCrypto"},{"key":"1937_CR45","unstructured":"Community M (2018) Miracl cryptography library. https:\/\/github.com\/miracl\/MIRACL"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01937-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01937-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01937-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:32:19Z","timestamp":1746844339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01937-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,27]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1937"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01937-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,27]]},"assertion":[{"value":"22 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"Author would like to report that they have no conflicts.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors give their consent to publish.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no Conflict of interest.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"108"}}