
ing ACC.Acc.Veri f y(A,WU,U). When the verifica-
tion result is true, U know the fact that she has been
blocked for some time, and she can try later or reach
the server. QPTA assures resilience to DoS.
Proposition 4: QPTA assures resilience to leakage of
ephemeral secret keys. Every x in M
1
is encrypted un-
der the public key of Bob, so the leakage of K of every
session does not risk the security of QPTA since the
adversary is restricted by the requirement of the long-
term secret key (sk
b
) for decrypting x of M
1
.
Proposition 5: QPTA prevents stolen smartcard-
verifier attack. An adversary with the smart card can-
not pass the authentication steps. Despite knowing
SC and computing V
1
= H(H(ID)||SC), the adversary
cannot find V
2
= (AC
1
⊕ AC
2
) ⊕ (AC
3
⊕ AC
4
) as they
are authentication credentials stored in the devise of
U. Thus, it resits stolen smart card verifier attacks.
Proposition 6: QPTA prevents stolen verifier table
attack. An adversary who knows the database of S
may use the credentials to violate the authentication
of U, however, this attempt is futile for the adversary.
To compute sk, the adversary needs sk
b
so that it can
recover K. Further, to recover V
”
5
, it requires sec
1
for
computing H(sec
1
||V
”
2
). Consequently, the adversary
is unsuccessful in the stolen verifier table attack.
Proposition 7: QPTA prevents password and PIN
guessing attacks with overwhelming probability. The
adversary may acquire the password and PIN of U
via offline guessing attack, nonetheless, due to the
requirement of at least one choice out of Ac
3
⊕ AC
4
(biometrics) in Step 5, it cannot succeed in the user
authentication with probability more than
1
2
n
.
Proposition 8: QPTA assures anonymity with non-
negligible probability. Let WIN be an event in which
the adversary successfully violates the anonymity.
Since every M
1
is encrypted under the public key of
Bob pk
a
and it is randomized by nonce R, the proba-
bility of W IN is bounded by Pr(W IN) ≤
1
2
n
.
Proposition 9: QPTA ensures unlinkability with non-
negligible probability. The adversary has to link at
least any two M
1
and M
2
to violate unlinkability.
Because R is a nonce, every time m changes by at
least the probability of 1 −
1
2
n
, the resulting signcryp-
text changes with probability 1 −
1
2
n
. The adversarial
probability of linking any two M
1
and M
2
is
1
2
n
.
Proposition 10: QPTA ensures conditional trace-
ability. At Bob, after successful decryption of
x, if the verification of c = H(v,m,V
8
, pk
a
, pk
b
)
is false, Bob can report M
1
to the trusted third
party. The trusted third party can confirm this by
computing w
1
= a
1
.z − t
a,1
.c, w
2
= a
2
.z − t
a,2
.c,
V
8
= Decode(x − w
1
.s
b
) and m = E
−1
(E) and ver-
ifying c = H(v,m,V
8
, pk
a
, pk
b
) from M
1
. Note that
to do this, T T P needs the server’s secret key.
5 EFFICIENCY ANALYSIS
We compare computation, transmission, and storage
costs and safety traits of QPTA with related schemes
W1 (Banerjee et al., 2020), W2 (Qiu et al., 2020), W3
(Kwon et al., 2021) and W4 (Karati et al., 2023).
5.1 Security Features
The work (Qiu et al., 2020) does not hold resilience
to stolen data and password attacks, stolen smartcard
and password attacks and stolen verifier table attacks.
Further, (Banerjee et al., 2020) the work fails to re-
sist stolen data and password attacks (Karati et al.,
2023). Notably, Table 1 shows that QPTA satisfies
at least five security features more than the existing
schemes. QPTA ensures the comprehensive satisfac-
tion of twenty security goals.
5.2 Computation Cost
In Table 2, exclusive-OR operations, and encoding
and decoding operations are left because their cost is
negligible. Based on Table 2, compared to the most
recent work (Karati et al., 2023), QPTA has a higher
computation cost, but it attains enhanced security fea-
tures at the cost of increased computation.
5.3 Communication and Storage Costs
We assume the following: a salt, random num-
ber and ID of 16 bytes, biometric data, sym-
metric key and a hash of 32 bytes, and pub-
lic and secret key of 256 bytes. In QPTA,
S stores ⟨H(ID),AC
1
,AC
2
,AC
3
,AC
4
⟩ = 160
bytes in its database. ⟨SC⟩ is stored
in the smart card, which is 32 bytes.
⟨H(ID), AC
1
,AC
2
,AC
3
,AC
4
,hk,SC, salt⟩ = 240 bytes
is stored in U. ⟨H(ID),sec
1
,salt,hk,sk
U
,SC⟩ = 400
bytes. In total, QPTA consumes 800 bytes for storage.
regarding communication cost, M
1
consumes 576
bytes, and M
2
consumes 32 bytes. QPTA consumes
608 bytes as the communication cost. Figure 3 shows
the storage and communication costs of all schemes.
QPTA is quantum-safe, whereas the remaining
schemes are vulnerable to quantum adversaries.
6 CONCLUSION
This paper presented a quantum-safe privacy-
preserving multi-factor authentication scheme called
QPTA for lightweight devices. QPTA ensured multi-
factor security. QPTA facilitated users to choose more
QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices
809