
58% of total F1-F7 and A1-A5 traits, making it a fea-
sible solution with adequate functional overheads.
6 CONCLUSION AND FUTURE
RESEARCH DIRECTION
The paper introduces a robust privacy-preserved au-
thentication and key agreement for the space infor-
mation network. It offers various safety traits, includ-
ing mutual authentication, session key agreement, for-
ward/backward secrecy, and user anonymity. Under
the decisional-RLWE assumption, it withstands sev-
eral attacks, including quantum, user impersonation,
replay and man-in-the-middle attacks. Compared to
existing works, the suggested protocol provides am-
ple operational safety (at least 40% more) with ade-
quate computation, transmission, and storage costs.
Although, our protocol has comprehensive traits,
it needs more storage and processing power due to
SETLA-based approach. In the future, we will design
a more efficient authentication for undeniable services
in a zero-trust region-based multi-NCC framework.
ACKNOWLEDGEMENTS
This work was supported in part by the National Sci-
ence and Technology Council (NSTC) under grants
112-2221-E-110-027 and 112-2634-F-110-001-MBK
and by the CANSEC-LAB@NSYSU in Taiwan.
REFERENCES
Al-Mekhlafi, Z. G., Al-Shareeda, M. A., Manickam, S.,
Mohammed, B. A., and Qtaish, A. (2023). Lattice-
based lightweight quantum resistant scheme in 5G-
enabled vehicular networks. Mathematics, 11(2):399.
Bai, S. and Galbraith, S. D. (2014). An improved compres-
sion technique for signatures based on learning with
errors. In Topics in Cryptology – CT-RSA 2014, pages
28–47, Cham. Springer International Publishing.
Chen, Y.-A., Zhang, Q., Chen, T.-Y., Cai, W.-Q., Liao, S.-
K., Zhang, J., Chen, K., Yin, J., Ren, J.-G., Chen, Z.,
et al. (2021). An integrated space-to-ground quantum
communication network over 4,600 kilometres. Na-
ture, 589(7841):214–219.
Dharminder, D., Dadsena, P. K., Gupta, P., and Sankaran, S.
(2023). A post quantum secure construction of an au-
thentication protocol for satellite communication. Int.
J. Satell. Comm. N., 41(1):14–28.
Duong, D. H., Fukushima, K., Kiyomoto, S., Roy, P. S.,
and Susilo, W. (2019). A lattice-based public key en-
cryption with equality test in standard model. In In-
formation Security and Privacy–ACISP 2019, pages
138–155, Cham. Springer International Publishing.
G
´
erard, F. and Merckx, K. (2018). SETLA: Signature and
encryption from lattices. In Intl. Conf. on Cryptology
and Network Security, pages 299–320. Springer.
Girault, M. (1991). Self-certified public keys. In Ad-
vances in Cryptology – EUROCRYPT’91, pages 490–
497, Berlin, Heidelberg. Springer.
Guo, J. and Du, Y. (2020). A novel RLWE-based anony-
mous mutual authentication protocol for space infor-
mation network. Secur. commun. netw., 2020:1–12.
Guo, J., Du, Y., Wu, X., Li, M., Wu, R., and Sun, Z. (2022).
PSAA: Provable secure and anti-quantum authentica-
tion based on randomized RLWE for space informa-
tion network. arXiv preprint arXiv:2208.00901.
Karati, A., Chang, Y.-S., and Chen, T.-Y. (2023). Robust
three-factor lightweight authentication based on ex-
tended chaotic maps for portable resource-constrained
devices. In Proc. of the 20th International Confer-
ence on Security and Cryptography - SECRYPT, pages
673–682. INSTICC, SciTePress.
Le, H. Q., Duong, D. H., Roy, P. S., Susilo, W., Fukushima,
K., and Kiyomoto, S. (2021). Lattice-based signcryp-
tion with equality test in standard model. Computer
Standards & Interfaces, 76:103515.
Liberg, O., L
¨
owenmark, S. E., and Euler et al., S. (2020).
Narrowband internet of things for non-terrestrial net-
works. IEEE Commun. Mag., 4(4):49–55.
Lyubashevsky, V. (2009). Fiat-shamir with aborts: Applica-
tions to lattice and factoring-based signatures. In Intl.
Conf. on the Theory and Application of Cryptology
and Information Security, pages 598–616. Springer.
Lyubashevsky, V. (2012). Lattice signatures without trap-
doors. In Advances in Cryptology – EUROCRYPT
2012, pages 738–755, Berlin, Heidelberg. Springer.
Lyubashevsky, V. and Micciancio, D. (2018). Asymptoti-
cally efficient lattice-based digital signatures. Journal
of Cryptology, 31(3):774–797.
Ma, R., Cao, J., Feng, D., and Li, H. (2019). LAA:
lattice-based access authentication scheme for iot in
space information networks. IEEE Internet Things J.,
7(4):2791–2805.
Ma, S., Zhang, M., Huang, Q., and Yang, B. (2015). Public
key encryption with delegated equality test in a multi-
user setting. The Computer Journal, 58(4):986–1002.
Ramos-Calderer, S., Bellini, E., Latorre, J. I., Manzano, M.,
and Mateu, V. (2021). Quantum search for scaled
hash function preimages. Quantum Inf. Process.,
20(5):180.
Roy, P. S., Duong, D. H., Susilo, W., Sipasseuth, A.,
Fukushima, K., and Kiyomoto, S. (2022). Lattice-
based public-key encryption with equality test sup-
porting flexible authorization in standard model. The-
oretical Computer Science, 929:124–139.
Sato, S. and Shikata, J. (2018). Lattice-based signcryption
without random oracles. In Post-Quantum Cryptog-
raphy, pages 331–351, Cham. Springer International
Publishing.
Yang, Q., Xue, K., Xu, J., Wang, J., Li, F., and Yu, N.
(2018). AnFRA: Anonymous and fast roaming au-
thentication for space information network. IEEE
Trans. Inf. Forensics Secur., 14(2):486–497.
QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks
309