{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T02:32:53Z","timestamp":1755225173548,"version":"3.43.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3736219","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"313-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Quantum-Secure Framework for IoD: Strengthening Authentication and Key-Establishment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8984-3199","authenticated-orcid":false,"given":"Salman","family":"Shamshad","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Bristol, Bristol, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0069-8552","authenticated-orcid":false,"given":"Sana","family":"Belguith","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bristol, Bristol, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7723-3932","authenticated-orcid":false,"given":"Alma","family":"Oracevic","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Bristol, Bristol, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2024. QSAKE. https:\/\/github.com\/CryptoAuthentication\/QSAKE-Protocol-Implementation\/tree\/main"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Wahid Akram Ali\u00a0Kashif Bashir Salman Shamshad Muhammad\u00a0Asad Saleem Ahmad\u00a0Ali AlZubi Shehzad\u00a0Ashraf Chaudhry Bander\u00a0A Alzahrani and Yousaf\u00a0Bin Zikria. 2021. A secure and lightweight drones-access protocol for smart city surveillance. IEEE Transactions on Intelligent Transportation Systems 23 10 (2021) 19634\u201319643.","DOI":"10.1109\/TITS.2021.3129913"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Bander\u00a0A Alzahrani Ahmed Barnawi and Shehzad\u00a0Ashraf Chaudhry. 2021. A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems. Security and Communication Networks 2021 1 (2021) 3437373.","DOI":"10.1155\/2021\/3437373"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Akhtar Badshah Ghulam Abbas Muhammad Waqas Shanshan Tu Ziaul\u00a0Haq Abbas Fazal Muhammad and Sheng Chen. 2024. USAF-IoD: ultralightweight and secure authenticated key agreement framework for internet of Drones environment. IEEE Transactions on Vehicular Technology 73 8 (2024) 10963\u201310977.","DOI":"10.1109\/TVT.2024.3375758"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Ilker Bekmezci Ozgur\u00a0Koray Sahingoz and \u015eamil Temel. 2013. Flying ad-hoc networks (FANETs): A survey. Ad Hoc Networks 11 3 (2013) 1254\u20131270.","DOI":"10.1016\/j.adhoc.2012.12.004"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Aymen Dia\u00a0Eddine Berini Mohamed\u00a0Amine Ferrag Brahim Farou and Hamid Seridi. 2023. HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones. Pervasive and Mobile Computing 92 (2023) 101798.","DOI":"10.1016\/j.pmcj.2023.101798"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Pietro Boccadoro Domenico Striccoli and Luigi\u00a0Alfredo Grieco. 2021. An extensive survey on the Internet of Drones. Ad Hoc Networks 122 (2021) 102600.","DOI":"10.1016\/j.adhoc.2021.102600"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_22"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_6"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Ozlem Ceviz Sevil Sen and Pinar Sadioglu. 2024. A survey of security in uavs and fanets: Issues threats analysis of attacks and solutions. IEEE Communications Surveys & Tutorials (2024).","DOI":"10.1109\/COMST.2024.3515051"},{"key":"e_1_3_3_1_12_2","first-page":"337","volume-title":"2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications","author":"Chang Ya-Fen","year":"2022","unstructured":"Ya-Fen Chang, Sheng-Jie Huang, Guan-Xi Chen, and Wei-Liang Tai. 2022. A critique of a lightweight authentication and key agreement scheme for Internet of Drones. In 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications. Springer, 337\u2013346."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Dharminder Chaudhary and Cheng-Chi Lee. 2024. Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones. Computers and Electrical Engineering 120 (2024) 109774.","DOI":"10.1016\/j.compeleceng.2024.109774"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Shehzad\u00a0Ashraf Chaudhry Jamel Nebhen Azeem Irshad Ali\u00a0Kashif Bashir Rupak Kharel Keping Yu and Yousaf\u00a0Bin Zikria. 2021. A physical capture resistant authentication scheme for the internet of drones. IEEE Communications Standards Magazine 5 4 (2021) 62\u201367.","DOI":"10.1109\/MCOMSTD.0001.2100006"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Abdelouahid Derhab Omar Cheikhrouhou Azza Allouch Anis Koubaa Basit Qureshi Mohamed\u00a0Amine Ferrag Leandros Maglaras and Farrukh\u00a0Aslam Khan. 2023. Internet of drones security: Taxonomies open issues and future directions. Vehicular Communications 39 (2023) 100552.","DOI":"10.1016\/j.vehcom.2022.100552"},{"key":"e_1_3_3_1_16_2","unstructured":"Android Developers. 2024. javax.crypto: Cryptography package in Android. https:\/\/developer.android.com\/reference\/javax\/crypto\/package-summary. Accessed: 2024-11-01."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Danny Dolev and Andrew Yao. 1983. On the security of public key protocols. IEEE Transactions on information theory 29 2 (1983) 198\u2013208.","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_4"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Mirmojtaba Gharibi Raouf Boutaba and Steven\u00a0L Waslander. 2016. Internet of drones. IEEE Access 4 (2016) 1148\u20131162.","DOI":"10.1109\/ACCESS.2016.2537208"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_3"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"crossref","unstructured":"Sajid Hussain Shehzad\u00a0Ashraf Chaudhry Osama\u00a0Ahmad Alomari Mohammed\u00a0H Alsharif Muhammad\u00a0Khurram Khan and Neeraj Kumar. 2021. Amassing the security: An ECC-based authentication scheme for Internet of drones. IEEE Systems Journal 15 3 (2021) 4431\u20134438.","DOI":"10.1109\/JSYST.2021.3057047"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Sajid Hussain Khalid Mahmood Muhammad\u00a0Khurram Khan Chien-Ming Chen Bander\u00a0A Alzahrani and Shehzad\u00a0Ashraf Chaudhry. 2022. Designing secure and lightweight user access to drone for smart city surveillance. Computer Standards & Interfaces 80 (2022) 103566.","DOI":"10.1016\/j.csi.2021.103566"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Azeem Irshad Bander\u00a0A Alzahrani Aiiad Albeshri Khalid Alsubhi Anand Nayyar and Shehzad\u00a0Ashraf Chaudhry. 2023. SPAKE-DC: A secure PUF enabled authenticated key exchange for 5G-based drone communications. IEEE Transactions on Vehicular Technology 73 4 (2023) 5770\u20135780.","DOI":"10.1109\/TVT.2023.3333398"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Muhammad\u00a0Asghar Khan Neeraj Kumar Saeed\u00a0Hamood Alsamhi Gordana Barb Justyna Zywio\u0142ek Insaf Ullah Fazal Noor Jawad\u00a0Ali Shah and Abdullah\u00a0M Almuhaideb. 2024. Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review. IEEE Transactions on Network and Service Management 22 1 (2024) 892\u2013912.","DOI":"10.1109\/TNSM.2024.3487265"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Neal Koblitz and Alfred\u00a0J Menezes. 2015. The random oracle model: a twenty-year retrospective. Des. Codes Cryptogr. 77 (2015) 587\u2013610.","DOI":"10.1007\/s10623-015-0094-2"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_1"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"crossref","unstructured":"Khalid Mahmood Zahid Ghaffar Muhammad Farooq Khalid Yahya Ashok\u00a0Kumar Das and Shehzad\u00a0Ashraf Chaudhry. 2024. A security enhanced chaotic-map based authentication protocol for internet of drones. IEEE Internet of Things Journal 11 12 (2024) 22301\u201322309.","DOI":"10.1109\/JIOT.2024.3379930"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Dheerendra Mishra Mrityunjay Singh Purva Rewal Komal Pursharthi Neeraj Kumar Ahmed Barnawi and Rajkumar\u00a0Singh Rathore. 2023. Quantum-safe secure and authorized communication protocol for internet of drones. IEEE Transactions on Vehicular Technology 72 12 (2023) 16499\u201316507.","DOI":"10.1109\/TVT.2023.3292169"},{"key":"e_1_3_3_1_29_2","volume-title":"Transition to post-quantum cryptography standards","author":"Moody Dustin","year":"2024","unstructured":"Dustin Moody, Ray Perlner, Andrew Regenscheid, Angela Robinson, and David Cooper. 2024. Transition to post-quantum cryptography standards. Technical Report. National Institute of Standards and Technology."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8547.ipd"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Mahdi Nikooghadam Haleh Amintoosi SK\u00a0Hafizul Islam and Mostafa\u00a0Farhadi Moghadam. 2021. A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance. Journal of Systems Architecture 115 (2021) 101955.","DOI":"10.1016\/j.sysarc.2020.101955"},{"key":"e_1_3_3_1_32_2","unstructured":"National\u00a0Institute of Standards and Technology (NIST). 2024. Post-Quantum Cryptography Project. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography Accessed: 2024-10-08."},{"key":"e_1_3_3_1_33_2","unstructured":"National\u00a0Institute of Standards and Technology. 2024. NIST Releases First 3 Finalized Post-Quantum Encryption Standards. https:\/\/www.nist.gov\/news-events\/news\/2024\/08\/nist-releases-first-3-finalized-post-quantum-encryption-standards Accessed: 2024-10-13."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Yohan Park Daeun Ryu Deokkyu Kwon and Youngho Park. 2023. Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments. Sensors 23 4 (2023) 2034.","DOI":"10.3390\/s23042034"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44618-9_22"},{"key":"e_1_3_3_1_36_2","unstructured":"Open Quantum\u00a0Safe project. 2024. liboqs-python: Python Wrapper for the Open Quantum Safe library (liboqs). https:\/\/github.com\/open-quantum-safe\/liboqs-python. Accessed: 2024-11-01."},{"key":"e_1_3_3_1_37_2","unstructured":"Open Quantum\u00a0Safe project. 2024. liboqs: The Open Quantum Safe library. https:\/\/openquantumsafe.org\/liboqs\/. Accessed: 2024-11-01."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Muskan Sharma Bhawna Narwal Revika Anand Amar\u00a0Kumar Mohapatra and Richa Yadav. 2023. PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Computers and Electrical Engineering 108 (2023) 108662.","DOI":"10.1016\/j.compeleceng.2023.108662"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_3_1_40_2","unstructured":"Victor Shoup. 2004. Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive (2004)."},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Muhammad Tanveer Hisham Alasmary Neeraj Kumar and Amiya Nayak. 2023. SAAF-IoD: Secure and anonymous authentication framework for the Internet of Drones. IEEE Transactions on Vehicular Technology 73 1 (2023) 232\u2013244.","DOI":"10.1109\/TVT.2023.3306813"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Muhammad Tanveer Abdallah Aldosary Ashok\u00a0Kumar Das Saud\u00a0Alhajaj Aldossari Shehzad\u00a0Ashraf Chaudhry et\u00a0al. 2024. PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones. IEEE Transactions on Vehicular Technology 73 7 (2024) 9560\u20139574.","DOI":"10.1109\/TVT.2024.3365992"},{"key":"e_1_3_3_1_43_2","first-page":"111","volume-title":"European Symposium on Research in Computer Security","author":"Wang Ding","year":"2016","unstructured":"Ding Wang and Ping Wang. 2016. On the implications of Zipf\u2019s law in passwords. In European Symposium on Research in Computer Security. Springer, 111\u2013131."},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Mohammad Wazid Ashok\u00a0Kumar Das Neeraj Kumar Athanasios\u00a0V Vasilakos and Joel\u00a0JPC Rodrigues. 2018. Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment. IEEE Internet of Things Journal 6 2 (2018) 3572\u20133584.","DOI":"10.1109\/JIOT.2018.2888821"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Sungjin Yu Ashok\u00a0Kumar Das Youngho Park and Pascal Lorenz. 2022. SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments. IEEE Transactions on Vehicular Technology 71 10 (2022) 10374\u201310388.","DOI":"10.1109\/TVT.2022.3188769"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Yunru Zhang Debiao He Li Li and Biwen Chen. 2020. A lightweight authentication and key agreement scheme for Internet of Drones. Computer Communications 154 (2020) 455\u2013464.","DOI":"10.1016\/j.comcom.2020.02.067"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3736219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:30:41Z","timestamp":1755070241000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3736219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":45,"alternative-id":["10.1145\/3708821.3736219","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3736219","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}