journal article Open Access Apr 10, 2026

HM-AKA+: Protecting against a semi-trusted third party with Hybrid Crypto

View at Publisher Save 10.1007/s12095-026-00883-1
Topics

No keywords indexed for this article. Browse by subject →

References
36
[1]
Proos, J., Zalka, C.: Shor’s discrete logarithm quantum algorithm for elliptic curves. arXiv:quant-ph/0301141 (2003) 10.26421/qic3.4-3
[2]
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC ’96), pp. 212–219. ACM, Philadelphia, PA, USA (1996). https://doi.org/10.1145/237814.237866, arxiv:quant-ph/9605043 10.1145/237814.237866
[3]
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

Peter W. Shor

SIAM Journal on Computing 1997 10.1137/s0097539795293172
[4]
Bos, J.W., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.W., Schwabe, P., Seiler, G., Stehlé, D.: CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 353–367 (2018). IEEE 10.1109/eurosp.2018.00032
[5]
National Institute of Standards and Technology: Module-lattice-based key-encapsulation mechanism (ml-kem). Technical Report FIPS 203, National Institute of Standards and Technology (NIST) (2024). https://doi.org/10.6028/NIST.FIPS.203 10.6028/nist.fips.203
[6]
National Institute of Standards and Technology: Module-lattice-based digital signature standard (ml-dsa). Technical Report FIPS 204, National Institute of Standards and Technology (NIST) (2024). https://doi.org/10.6028/NIST.FIPS.204 10.6028/nist.fips.204
[7]
Bürstinghaus-Steinbach, K., Krauß, C., Niederhagen, R., Schneider, M.: Post-quantum tls on embedded systems: Integrating and evaluating kyber and SPHINCS+ with mbed TLS. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, pp. 841–852 (2020). ACM 10.1145/3320269.3384725
[8]
Celi, S., Schwabe, P., Stebila, D., Sullivan, N., Wiggers, T.: KEM-based Authentication for TLS 1.3. Internet-Draft draft-celi-wiggers-tls-authkem-01, Work in Progress (2020). https://datatracker.ietf.org/doc/draft-celi-wiggers-tls-authkem
[9]
Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum tls without handshake signatures. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1461–1480. Association for Computing Machinery, New York, NY, USA (2020). ACM 10.1145/3372297.3423350
[10]
Stadler, S., Sakaguti, V., Kaur, H., Fehlhaber, A.L.: Hybrid signal protocol for post-quantum email encryption. Cryptology ePrint Archive (2021). https://eprint.iacr.org/2021
[11]
McKay, K.A., Cooper, D.: Recommendation for stateful hash-based signature schemes. NIST Special Publication 800-208, National Institute of Standards and Technology (2020). https://doi.org/10.6028/NIST.SP.800-208 10.6028/nist.sp.800-208
[12]
Giron, A.A., Custódio, R., Rodríguez-Henríquez, F.: Post-quantum hybrid key exchange: A systematic mapping study. J. Cryptogr. Eng. 13(1), 71–88 (2023). https://doi.org/10.1007/s13389-022-00288-9 10.1007/s13389-022-00288-9
[13]
Paquin, C., Stebila, D., Tamvada, G.: Benchmarking post-quantum cryptography in TLS. In: International Conference on Post-Quantum Cryptography, pp. 72–91 (2020) 10.1007/978-3-030-44223-1_5
[14]
Sikeridis, D., Kampanakis, P., Devetsikiotis, M.: Assessing the overhead of post-quantum cryptography in TLS 1.3 and SSH. In: Proceedings of the 16th International Conference on Emerging Networking EXperiments and Technologies (CoNEXT), pp. 149–156 (2020) 10.1145/3386367.3431305
[15]
Heider, T.: Towards a verifiably secure quantum-resistant key exchange in IKEv2. Master’s thesis, Ludwig Maximilian University of Munich (2019)
[16]
Popa, A.B.: Qgp-vpn: Qkd enhanced vpn solution for general-purpose encrypted communications. In: 22nd RoEduNet Conference: Networking in Education and Research (RoEduNet), pp. 1–6 (2023) 10.1109/roedunet60162.2023.10274931
[17]
Schanck, J.M., Whyte, W., Zhang, Z.: Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world. Proc. Priv. Enhanc. Technol. 2016(4), 219–236 (2016)
[18]
Damir, M.T., Meskanen, T., Ramezanian, S., Niemi, V.: A Beyond-5G authentication and key agreement protocol. In: International Conference on Network and System Security, pp. 249–264 (2022) 10.1007/978-3-031-23020-2_14
[19]
Braeken, A.: Flexible hybrid post-quantum bidirectional multi-factor authentication and key agreement framework using ECC and KEM. Futur. Gener. Comput. Syst. (2025). https://doi.org/10.1016/j.future.2025.01.012 10.1016/j.future.2025.01.012
[20]
Barnes, R., Wood, C.A., Becker, H., Rescorla, E.: Hybrid public key encryption. Internet Engineering Task Force (2022). https://doi.org/10.17487/RFC9180 10.17487/rfc9180
[21]
Rescorla, E.: The transport layer security (TLS) Protocol Version 1.3. IETF (2018). https://doi.org/10.17487/RFC8446 10.17487/rfc8446
[22]
3GPP: 3GPP TS 33.501: 5G Security architecture (2020). https://www.3gpp.org/DynaReport/33501.htm. Accessed: 12 Mar 2025
[23]
Braeken, A.: Public key versus symmetric key cryptography in client-server authentication protocols. Int. J. Inf. Secur. 21(1), 103–114 (2022) 10.1007/s10207-021-00543-w
[24]
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)
[25]
Mattsson, J.P., Smeets, B., Thormarker, E.: Quantum technology and its impact on security in mobile networks. Ericsson Technology Review. (2021). https://bit.ly/3lIpfHU 10.23919/etr.2021.9904724
[26]
Harshey, B., Bansal, S.K., Chack, D.: A state-of-the-art study on physical unclonable functions for hardware intrinsic security. In: Nanoelectronic Devices for Hardware and Software Security, 1st edn. CRC Press, Boca Raton, FL, USA (2021) 10.1201/9781003126645-7
[27]
Segers, L., Silva, B.D., Touhafi, A., Braeken, A.: Trustworthy environmental monitoring using hardware assisted security mechanisms. Sensors 24(14) (2024) 10.3390/s24144720
[28]
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in Cryptology – EUROCRYPT 2004 (Interlaken, Switzerland). Lecture Notes in Computer Science, vol. 3027, pp. 523–540. Springer, Berlin, Heidelberg (2004) 10.1007/978-3-540-24676-3_31
[29]
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983). https://doi.org/10.1109/TIT.1983.1056650 10.1109/tit.1983.1056650
[30]
Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology — EUROCRYPT 2001 (Innsbruck, Austria). Lecture Notes in Computer Science, vol. 2045, pp. 453–474. Springer, Berlin, Heidelberg (2001). https://doi.org/10.1007/3-540-44987-6_28 10.1007/3-540-44987-6_28
[31]
Wang, C., Wang, D., Xu, G., He, D.: Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci. China Inf. Sci. 65(1), 112301 (2022). https://doi.org/10.1007/s11432-020-2975-6 10.1007/s11432-020-2975-6
[32]
Cremers, C.: Key exchange in ipsec revisited: Formal analysis of ikev1 and ikev2. In: Atluri, V., Diaz, C. (eds.) Computer Security - ESORICS 2011, pp. 315–334. Springer, Berlin, Heidelberg (2011) 10.1007/978-3-642-23822-2_18
[33]
Pointcheval, D., Zimmer, S.: Multi-factor authenticated key exchange. In: Artificial Intelligence and Security, and Lecture Notes in Bioinformatics. Lecture Notes in Computer Science, vol. 5037, pp. 277–295. Springer, Berlin, Heidelberg (2008). https://doi.org/10.1007/978-3-540-68880-8_25 10.1007/978-3-540-68880-8_25
[34]
Barker, E.: Recommendation for key management, part 1: General. Technical Report NIST Special Publication 800-57 Part 1 Rev. 5, National Institute of Standards and Technology (NIST) (2020). https://doi.org/10.6028/NIST.SP.800-57pt1r5 10.6028/nist.sp.800-57pt1r5
[35]
Braeken, A.: Highly efficient bidirectional multi-factor authentication and key agreement for real-time access to sensor data. IEEE Internet Things J., (2023). Early access or volume TBD if not specified 10.1109/jiot.2023.3284501
[36]
ECRYPT: eBACS: ECRYPT benchmarking of cryptographic systems (2025). https://bench.cr.yp.to/. Accessed: 11 Jun 2025
Metrics
0
Citations
36
References
Details
Published
Apr 10, 2026
License
View
Funding
Universidad de Málaga
Cite This Article
Jorge Munilla, An Braeken (2026). HM-AKA+: Protecting against a semi-trusted third party with Hybrid Crypto. Cryptography and Communications. https://doi.org/10.1007/s12095-026-00883-1