{"title":"Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges","authors":"Ponnuru Raveendra Babu , Sathish A.P. Kumar , Alavalapati Goutham Reddy , Ashok Kumar Das","doi":"10.1016/j.cosrev.2024.100676","DOIUrl":null,"url":null,"abstract":"<div><p>This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication.</p></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"54 ","pages":"Article 100676"},"PeriodicalIF":13.3000,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013724000601","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This study provides an in-depth survey of quantum secure authentication and key agreement protocols, investigating the dynamic landscape of cryptographic techniques within the realm of quantum computing. With the potential threat posed by quantum computing advancements to classical cryptographic protocols, the exploration of secure authentication and key agreement in the quantum era becomes imperative for safeguarding communication systems. The research scrutinizes evolving methodologies and innovations designed to enhance the security of authentication processes and key agreements in the context of quantum computing. A comprehensive examination of existing protocols is conducted, elucidating their strengths, limitations, and potential vulnerabilities. The research includes a comparative assessment of security features and computational burdens associated with various quantum secure authentication and key agreement protocols. The survey concludes by underscoring the urgent need for further research in the development of secure and efficient quantum cloud computing environments, as well as lightweight post-quantum cryptographic primitives, to ensure the viability of quantum secure authentication protocols on a universal scale. This comprehensive overview serves as a valuable resource for researchers, practitioners, and policymakers in the rapidly evolving field of quantum secure communication.
期刊介绍:
Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.