# American Institute of Mathematical Sciences

• Previous Article
On finite length nonbinary sequences with large nonlinear complexity over the residue ring $\mathbb{Z}_{m}$
• AMC Home
• This Issue
• Next Article
Optimal antiblocking systems of information sets for the binary codes related to triangular graphs
doi: 10.3934/amc.2021009

## Formal security proof for a scheme on a topological network

 1 Department of Information Engineering, Computer Science, and Mathematics, University of L'Aquila, Via Vetoio, 67100 L'Aquila (AQ), Italy 2 Department of Mathematics, University of Trento, Via Sommarive 14, 38123 Povo (TN), Italy

* Corresponding author

Received  November 2020 Revised  February 2021 Published  April 2021

Fund Project: The authors are members of INdAM-GNSAGA (Italy). This work was partially supported by the Centre of EXcellence on Connected, Geo-Localized and Cybersecure Vehicles (EX-Emerge), funded by Italian Government under CIPE resolution n. 70/2017 (Aug. 7, 2017)

Key assignment and key maintenance in encrypted networks of resource-limited devices may be a challenging task, due to the permanent need of replacing out-of-service devices with new ones and to the consequent need of updating the key information. Recently, Aragona et al. proposed a new cryptographic scheme, ECTAKS, which provides a solution to this design problem by means of a Diffie-Hellman-like key establishment protocol based on elliptic curves and on a prime field. Even if the authors proved some results related to the security of the scheme, the latter still lacks a formal security analysis. In this paper, we address this issue by providing a security proof for ECTAKS in the setting of computational security, assuming that no adversary can solve the underlying discrete logarithm problems with non-negligible success probability.

Citation: Roberto Civino, Riccardo Longo. Formal security proof for a scheme on a topological network. Advances in Mathematics of Communications, doi: 10.3934/amc.2021009
##### References:
 [1] R. Aragona, R. Civino, N. Gavioli and M. Pugliese, An authenticated key scheme over elliptic curves for topological networks, preprint, arXiv: 2006.02147. To appear in Journal of Discrete Mathematical Sciences & Cryptography Google Scholar [2] D. Boneh, The decision Diffie-Hellman problem, Algorithmic Number Theory (Portland, OR), Lecture Notes in Comput. Sci., 1423, Springer, (1998), 48-63. doi: 10.1007/BFb0054851.  Google Scholar [3] W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, 22 (1976), 644-654.  doi: 10.1109/tit.1976.1055638.  Google Scholar [4] S. Marchesani, L. Pomante, M. Pugliese and F. Santucci, Definition and development of a topology-based cryptographic scheme for wireless sensor networks, in Sensor Systems and Software, Springer International Publishing, (2013), 47-64. doi: 10.1007/978-3-319-04166-7_4.  Google Scholar [5] S. Marchesani, L. Pomante, F. Santucci and M. Pugliese, A cryptographic scheme for real-world wireless sensor networks applications, in Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems, Association for Computing Machinery, 2013. doi: 10.1145/2502524.2502568.  Google Scholar [6] M. Pugliese, Managing Security Issues in Advanced Applications of Wireless Sensor Networks, Ph.D thesis, Department of Electrical Engineering and Computer Science, University of L'Aquila, 2008, available at https://mpugliese.webnode.it/_files/200000061-a7608a760b/24.%20phd_thesis.pdf. Google Scholar [7] J. H. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, Graduate Texts in Mathematics, 2009. doi: 10.1007/978-0-387-09494-6.  Google Scholar

show all references

##### References:
 [1] R. Aragona, R. Civino, N. Gavioli and M. Pugliese, An authenticated key scheme over elliptic curves for topological networks, preprint, arXiv: 2006.02147. To appear in Journal of Discrete Mathematical Sciences & Cryptography Google Scholar [2] D. Boneh, The decision Diffie-Hellman problem, Algorithmic Number Theory (Portland, OR), Lecture Notes in Comput. Sci., 1423, Springer, (1998), 48-63. doi: 10.1007/BFb0054851.  Google Scholar [3] W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, 22 (1976), 644-654.  doi: 10.1109/tit.1976.1055638.  Google Scholar [4] S. Marchesani, L. Pomante, M. Pugliese and F. Santucci, Definition and development of a topology-based cryptographic scheme for wireless sensor networks, in Sensor Systems and Software, Springer International Publishing, (2013), 47-64. doi: 10.1007/978-3-319-04166-7_4.  Google Scholar [5] S. Marchesani, L. Pomante, F. Santucci and M. Pugliese, A cryptographic scheme for real-world wireless sensor networks applications, in Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems, Association for Computing Machinery, 2013. doi: 10.1145/2502524.2502568.  Google Scholar [6] M. Pugliese, Managing Security Issues in Advanced Applications of Wireless Sensor Networks, Ph.D thesis, Department of Electrical Engineering and Computer Science, University of L'Aquila, 2008, available at https://mpugliese.webnode.it/_files/200000061-a7608a760b/24.%20phd_thesis.pdf. Google Scholar [7] J. H. Silverman, The Arithmetic of Elliptic Curves, Springer-Verlag, New York, Graduate Texts in Mathematics, 2009. doi: 10.1007/978-0-387-09494-6.  Google Scholar
An example of ${\rm{ANT}}$, where red nodes represent ${\rm{ANT}}_{{i}}$
Target ANT
 [1] Z. Reichstein and B. Youssin. Parusinski's "Key Lemma" via algebraic geometry. Electronic Research Announcements, 1999, 5: 136-145. [2] Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells. Ironwood meta key agreement and authentication protocol. Advances in Mathematics of Communications, 2021, 15 (3) : 397-413. doi: 10.3934/amc.2020073 [3] Guanming Gai, Yuanyuan Nie, Chunpeng Wang. A degenerate elliptic problem from subsonic-sonic flows in convergent nozzles. Communications on Pure & Applied Analysis, , () : -. doi: 10.3934/cpaa.2021070 [4] Palash Sarkar, Subhadip Singha. Verifying solutions to LWE with implications for concrete security. Advances in Mathematics of Communications, 2021, 15 (2) : 257-266. doi: 10.3934/amc.2020057 [5] Youjun Deng, Hongyu Liu, Xianchao Wang, Dong Wei, Liyan Zhu. Simultaneous recovery of surface heat flux and thickness of a solid structure by ultrasonic measurements. Electronic Research Archive, , () : -. doi: 10.3934/era.2021027 [6] Palash Sarkar, Subhadip Singha. Classical reduction of gap SVP to LWE: A concrete security analysis. Advances in Mathematics of Communications, 2021  doi: 10.3934/amc.2021004 [7] Mehmet Duran Toksari, Emel Kizilkaya Aydogan, Berrin Atalay, Saziye Sari. Some scheduling problems with sum of logarithm processing times based learning effect and exponential past sequence dependent delivery times. Journal of Industrial & Management Optimization, 2021  doi: 10.3934/jimo.2021044 [8] Xianjun Wang, Huaguang Gu, Bo Lu. Big homoclinic orbit bifurcation underlying post-inhibitory rebound spike and a novel threshold curve of a neuron. Electronic Research Archive, , () : -. doi: 10.3934/era.2021023 [9] Yosra Soussi. Stable recovery of a non-compactly supported coefficient of a Schrödinger equation on an infinite waveguide. Inverse Problems & Imaging, , () : -. doi: 10.3934/ipi.2021022 [10] Nishant Sinha. Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack. Advances in Mathematics of Communications, 2021, 15 (3) : 539-556. doi: 10.3934/amc.2020081 [11] Chin-Chin Wu. Existence of traveling wavefront for discrete bistable competition model. Discrete & Continuous Dynamical Systems - B, 2011, 16 (3) : 973-984. doi: 10.3934/dcdsb.2011.16.973 [12] Matthias Erbar, Jan Maas. Gradient flow structures for discrete porous medium equations. Discrete & Continuous Dynamical Systems, 2014, 34 (4) : 1355-1374. doi: 10.3934/dcds.2014.34.1355 [13] M. R. S. Kulenović, J. Marcotte, O. Merino. Properties of basins of attraction for planar discrete cooperative maps. Discrete & Continuous Dynamical Systems - B, 2021, 26 (5) : 2721-2737. doi: 10.3934/dcdsb.2020202 [14] Craig Cowan. Supercritical elliptic problems involving a Cordes like operator. Discrete & Continuous Dynamical Systems, 2021  doi: 10.3934/dcds.2021037 [15] John Villavert. On problems with weighted elliptic operator and general growth nonlinearities. Communications on Pure & Applied Analysis, , () : -. doi: 10.3934/cpaa.2021023 [16] Paula A. González-Parra, Sunmi Lee, Leticia Velázquez, Carlos Castillo-Chavez. A note on the use of optimal control on a discrete time model of influenza dynamics. Mathematical Biosciences & Engineering, 2011, 8 (1) : 183-197. doi: 10.3934/mbe.2011.8.183 [17] Ronald E. Mickens. Positivity preserving discrete model for the coupled ODE's modeling glycolysis. Conference Publications, 2003, 2003 (Special) : 623-629. doi: 10.3934/proc.2003.2003.623 [18] Horst R. Thieme. Discrete-time dynamics of structured populations via Feller kernels. Discrete & Continuous Dynamical Systems - B, 2021  doi: 10.3934/dcdsb.2021082 [19] Wenmeng Geng, Kai Tao. Lyapunov exponents of discrete quasi-periodic gevrey Schrödinger equations. Discrete & Continuous Dynamical Systems - B, 2021, 26 (6) : 2977-2996. doi: 10.3934/dcdsb.2020216 [20] Ágota P. Horváth. Discrete diffusion semigroups associated with Jacobi-Dunkl and exceptional Jacobi polynomials. Communications on Pure & Applied Analysis, 2021, 20 (3) : 975-994. doi: 10.3934/cpaa.2021002

2019 Impact Factor: 0.734

## Tools

Article outline

Figures and Tables