In order to design lattice-based authentication key exchange (AKE)protocols with strong security, the article analyzes Wang0s work without authentication that are vulnerable to man-in-the-middle attacks and propose several AKE protocols based on the Bi-ISIS problem. Without signature etc. used to provide authentication, the management is simple, the overhead is low, and the efficiency is high, the security is directly based on the difficult assumption of the Bi-ISIS problem. Although they do not resist unknown key sharing attacks, it has security attributes such as anti-man-in-themiddle attack, session key independence, forward security, and anti-key leakage camouage attacks. The schemes is based on the difficult problem of lattice that they can resist quantum attacks.

How to Cite
ZHOU, BAOLEI MAO, Limin. Several Lattice-based AKEs on the SIS Problem. Global Journal of Science Frontier Research, [S.l.], sep. 2020. ISSN 2249-4626. Available at: <https://journalofscience.org/index.php/GJSFR/article/view/2785>. Date accessed: 28 nov. 2020.