A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT
Abstract
1. Introduction
2. Related Work
2.1. Traditional Authentication Schemes and Their Limitations
2.2. Research Progress of Post-Quantum Cryptography (PQC) in Authentication
2.3. Lightweight Design Technologies and Overhead Optimization
2.4. Research Gaps and Contributions of This Paper
3. Preliminary Knowledge
3.1. Kyber Key Encapsulation Mechanism
| Algorithm 1 Kyber.CCAKEM.KeyGen(). |
| Output: Public key Output: Secret key 1: 2: 3: 4: return |
| Algorithm 2 Kyber.CCAKEM.Enc(pk). |
| Input: Public key Output: Ciphertext Output: Shared key 1: 2: 3: 4: 5: return |
| Algorithm 3 Kyber.CCAKEM.Dec(c, sk) |
| Input: Ciphertext Input: Secret key Output: Shared key 1: 2: 3: 4: 5: if then 6: return 7: else 8: return 9: end if 10: return |
3.2. Fuzzy Commitment
3.3. System Model
4. The Proposed Scheme
4.1. Initialization
4.2. Registration
4.3. Authentication and Key Agreement
5. Security Analysis
5.1. Formal Analysis
- Assumption of Difficulty
- Game 1 (excludes hash collisions)
- Game 2 (replace shared key)
- Game 3 (replace MLWE component)
- Game 4 (replace fuzzy commitment keys)
- Game 5 (replaces final session key)
- Game 6 (Perfect Forward Secrecy)
5.2. Informal Analysis
5.2.1. Resistance to Man-in-the-Middle Attacks
5.2.2. Resistance to Replay Attacks
5.2.3. Forward Security
5.2.4. Resistance to Offline Dictionary Attacks
5.2.5. Resistance to Template Inversion Attacks
5.2.6. Anti-Quantum Attack
5.2.7. Privacy Compliance and GDPR Adherence
6. Performance Analysis
6.1. Functional Features
6.2. Computational Overhead
6.3. Communication Overhead
6.4. Energy Consumption
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Nithyavani, G.; Naga Raja, G. A Comprehensive Survey on Security and Privacy Challenges in Internet of Medical Things Applications: Deep Learning and Machine Learning Solutions, Obstacles, and Future Directions. IEEE Access 2025, 13, 188955–188989. [Google Scholar] [CrossRef]
- Ali, Z.; Mahmood, S.; ul Hassan, K.; Daud, A.; Alharbey, R.; Bukhari, A. A Lightweight and Secure Authentication Scheme for Remote Monitoring Of Patients in IOMT. IEEE Access 2024, 12, 73004–73020. [Google Scholar] [CrossRef]
- Sadhukhan, D.; Ray, S.; Biswas, G.P.; Khan, M.K.; Dasgupta, M. A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography. J. Supercomput. 2021, 77, 1114–1151. [Google Scholar] [CrossRef]
- Agrahari, A.K.; Varma, S.; Venkatesan, S. Two factor authentication protocol for IoT based healthcare monitoring system. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 16081–16098. [Google Scholar] [CrossRef] [PubMed]
- Fernández-Caramés, T.M. From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things. IEEE Internet Things J. 2020, 7, 6457–6480. [Google Scholar] [CrossRef]
- Bernstein, D.J. Post-quantum cryptography. In Encyclopedia of Cryptography, Security and Privacy; Springer: Berlin/Heidelberg, Germany, 2025; pp. 1846–1847. [Google Scholar]
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
- Almaiah, M.A.; Hajjej, F.; Ali, A.; Pasha, M.F.; Almomani, O. A novel hybrid trustworthy decentralized authentication and data preservation model for digital healthcare IoT based CPS. Sensors 2022, 22, 1448. [Google Scholar] [CrossRef]
- Liu, T.; Ramachandran, G.; Jurdak, R. Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization. arXiv 2024, arXiv:2401.17538. [Google Scholar] [CrossRef]
- Cruz-Piris, L.; López, A.M.; Álvarez-Campana, M.; Rodrigo, M.S.; Moreno, J.I.; Arroyo, D. Measuring the impact of post quantum cryptography in Industrial IoT scenarios. Internet Things 2025, 34, 101793. [Google Scholar] [CrossRef]
- Yavuz, A.A.; Darzi, S.; Nouma, S.E. LiteQSign: Lightweight and Quantum-Safe Signatures for Heterogeneous IoT Applications. IEEE Access 2025, 13, 171442–171456. [Google Scholar] [CrossRef]
- Adil, M.; Khan, M.K.; Jadoon, M.M.; Attique, M.; Song, H.; Farouk, A. An AI-Enabled Hybrid Lightweight Authentication Scheme for Intelligent IoMT Based Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 2023, 10, 2719–2730. [Google Scholar] [CrossRef]
- Bos, J.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehle, D. CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. In Proceedings of the 2018 IEEE European Symposium on Security and Privacy (EuroS&P), London, UK, 24–26 April 2018; pp. 353–367. [Google Scholar]
- Hammi, B.; Fayad, A.; Khatoun, R.; Zeadally, S.; Begriche, Y. A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 2020, 14, 3440–3450. [Google Scholar] [CrossRef]
- Abdaoui, A.; Erbad, A.; Al-Ali, A.K.; Mohamed, A.; Guizani, M. Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet Things J. 2022, 9, 9987–9998. [Google Scholar] [CrossRef]
- Chen, X.; Wang, B.; Li, H. A privacy-preserving multi-factor authentication scheme for cloud-assisted IoMT with post-quantum security. J. Inf. Secur. Appl. 2024, 81, 103708. [Google Scholar]
- Cao, B.; Zhao, J.; Lv, Z.; Gu, Y.; Yang, S.; Kang, X. RFID Reader Anticollision Based on Distributed Parallel Particle Swarm Optimization. IEEE Internet Things J. 2021, 8, 3099–3113. [Google Scholar] [CrossRef]
- Dabra, V.; Bala, A.; Kumari, S. LBA-PAKE: Lattice-Based Anonymous Password Authenticated Key Exchange for Mobile Devices. IEEE Syst. J. 2021, 15, 5067–5077. [Google Scholar] [CrossRef]
- Moody, D.; Alagic, G.; Alperin-Sheriff, J.M.; Apon, D.C.; Cooper, D.A.; Dang, Q.H.; Liu, Y.K.; Miller, C.A.; Peralta, R.C.; Perlner, R.A.; et al. Status Report on the First Round of the NIST Post-Quantum Cryptography Standardization Process; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2019. [Google Scholar]
- Wen, Y.; Su, Y.; Li, W. Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. Entropy 2025, 27, 765. [Google Scholar] [CrossRef] [PubMed]
- Sardar, A.; Umer, S.; Rout, R.K.; Sahoo, K.S.; Gandomi, A.H. Enhanced Biometric Template Protection Schemes for Securing Face Recognition in IoT Environment. IEEE Internet Things J. 2024, 11, 23196–23206. [Google Scholar] [CrossRef]
- Babu, P.R.; Kumar, S.A.P.; Reddy, A.G.; Das, A.K. Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges. Comput. Sci. Rev. 2024, 54, 100676. [Google Scholar] [CrossRef]
- Avanzi, R.; Bos, J.W.; Ducas, L.; Kiltz, E.; Lepoint, T.; Lyubashevsky, V.; Schanck, J.M.; Schwabe, P.; Seiler, G.; Stehl’e, D. CRYSTALS-Kyber Algorithm Specifications and Supporting Documentation. Technical Report. 2017. Available online: https://api.semanticscholar.org/CorpusID:198992527 (accessed on 26 February 2026).
- Teoh, A.B.J.; Kim, J. Secure biometric template protection in fuzzy Commitment scheme. IEICE Electron. Express 2007, 4, 724–730. [Google Scholar] [CrossRef]
- Juels, A.; Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, 1–4 November 1999; pp. 28–36. [Google Scholar]
- Daugman, J. Information Theory and the IrisCode. IEEE Trans. Inf. Forensics Secur. 2016, 11, 400–409. [Google Scholar] [CrossRef]
- Odinaka, I.; Lai, P.H.; Kaplan, A.D.; O’Sullivan, J.A.; Sirevaag, E.J.; Rohrbaugh, J.W. ECG Biometric Recognition: A Comparative Analysis. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1812–1824. [Google Scholar] [CrossRef]
- Keller, D.; Osadchy, M.; Dunkelman, O. Fuzzy Commitments Offer Insufficient Protection to Biometric Templates Produced by Deep Learning. arXiv 2020, arXiv:2012.13293. [Google Scholar] [CrossRef]
- Chang, D.; Garg, S.; Hasan, M.; Mishra, S. On security of fuzzy commitment scheme for biometric authentication. In Proceedings of the Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia, 25–27 November 2022; pp. 399–419. [Google Scholar]
- Wazid, M.; Das, A.K.; Odelu, V.; Kumar, N.; Susilo, W. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 2020, 17, 391–406. [Google Scholar] [CrossRef]
- Chaterjee, U.; Mukhopadhyay, D.; Chakraborty, R.S. 3PAA: A Private PUF Protocol for Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 2021, 16, 756–769. [Google Scholar] [CrossRef]
- Li, K.; Baird, C.; Lin, D. Defend Data Poisoning Attacks on Voice Authentication. IEEE Trans. Dependable Secur. Comput. 2024, 21, 1754–1769. [Google Scholar] [CrossRef]
- Qiu, S.; Wang, D.; Xu, G.; Kumari, S. Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1338–1351. [Google Scholar] [CrossRef]
- Grover, L.K. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; pp. 212–219. [Google Scholar]
- Kannwischer, M.J.; Rijneveld, J.; Schwabe, P.; Stoffelen, K. pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4. In Proceedings of the Second NIST PQC Standardization Conference, Santa Barbara, CA, USA, 22–24 August 2019; pp. 1–26. [Google Scholar]






| Category | Representative Tech. | Core Strengths (Pros) | Main Limitations (Cons) |
|---|---|---|---|
| Traditional Lightweight | ECC, Hash, XOR-based schemes | Short keys, high computational efficiency, and low implementation cost. | Vulnerable to quantum attacks; performance drops on constrained devices; lacks forward secrecy. |
| PQC Foundations | RLWE/MLWE (e.g., LBA-PAKE) | Quantum-resistant; supports anonymity and forward secrecy; formal ROR proofs. | High communication overhead (>10k bits); complex server-side processing; signal leakage risks. |
| Error Reconciliation | Signal functions, Voronoi cells | Reduces data transmission during key agreement. | Requires additional polynomial computation and increases implementation complexity. |
| Biometric Protection | Hamming code + Fuzzy Commitment | Avoids raw biometric template storage and improves privacy protection. | Error correction decoding may introduce additional processing latency. |
| Protocol Optimization | Round reduction, Batch verification | Reduces interaction rounds and improves authentication efficiency. | Requires strict time synchronization and may introduce replay attack risks. |
| Notation | Definition | Notation | Definition |
|---|---|---|---|
| Safety parameters | msk | Master secret key | |
| Terminal device i | mpk | Master public key | |
| Cloud server j | ⊕ | XOR operation | |
| Identity of | Hash function | ||
| Identity of | Timestamp | ||
| bio | Binary vector of biological features | KDF | Key derivation function |
| Compression seeds for vector reconstruction | SK | Session key | |
| Auth | Authentication tag | Extensible output function |
| Scheme | Resistance to Man-in-the-Middle Attack | Resistance to Quantum Attack | Resistance to Replay Attack | Forward Secrecy | Resistance to Offline Dictionary Attack | Resistance to Template Inversion Attack |
|---|---|---|---|---|---|---|
| [15] | ✓ | × | ✓ | ✓ | × | × |
| [14] | ✓ | × | ✓ | ✓ | × | × |
| [18] | ✓ | ✓ | ✓ | ✓ | ✓ | × |
| [16] | ✓ | ✓ | ✓ | ✓ | ✓ | × |
| Our | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| SHA3-256 | 0.15 | Polynomial multiplication | 0.49 |
| SHA-512 | 0.16 | Polynomial addition | 0.37 |
| Generation matrix | 1.96 | Rec | 0.82 |
| Random sampling (Kyber) | 1.88 | Helprec | 1.08 |
| Random sampling | 2.64 | Isogeny (n = 5) | 0.14 |
| ECC scalar multiplication | 35.76 | Modular square root | 0.08 |
| Elliptic curve dot product | 24.63 | Cha() | 0.89 |
| Modular inverse of a large integer | 0.02 | Mod | 0.5 |
| Scheme | Initiator | Responder |
|---|---|---|
| [15] | carry out 2 times of point multiplication and 20 times of inverse element | carry out 2 times of point multiplication and 20 times of inverse element |
| [14] | twice elliptic curve scalar multiplication, 1 + n times isogeny mapping, 1 + n times HMAC-SHA256, 1 + n times modular inverse, 2(1 + n) times modular square root, 1 time RNG (192-bit), and 8(1 + n) times 192-bit modular multiplication | twice elliptic curve scalar multiplication, 1 + n times isogeny mapping, 1 + n times HMAC-SHA256, 1 + n times modular inverse, 2(1 + n) times modular square root, 1 time RNG (192-bit), and 8(1 + n) times 192-bit modular multiplication |
| [18] | 8 hashing times 3 sampling times 4 polynomial multiplication times 3 polynomial addition times 2 polynomial addition times 1 cha() operation times 2 mod operations | 8 hashing times 3 sampling times 4 polynomial multiplication times 3 polynomial addition times 2 polynomial addition times 1 cha() operation times 2 mod operations |
| [16] | 5 hashes, 2 sampling, 1 polynomial addition, 6 polynomial multiplications, 2 Rec operations and 1 helprec operation | 5 hashes, 2 sampling, 1 polynomial addition, 6 polynomial multiplications, 2 Rec operations and 1 helprec operation |
| Our | 9 hashing 2 sampling 2 polynomial multiplication 2 polynomial addition 2 compression 2 decompression | 4 hashing 3 sampling 3 polynomial multiplication 2 polynomial addition 2 compression 2 decompression |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Yan, H.; Wang, Z.; Lin, L.; Sun, J.; Liu, S. A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. Sensors 2026, 26, 2021. https://doi.org/10.3390/s26072021
Yan H, Wang Z, Lin L, Sun J, Liu S. A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. Sensors. 2026; 26(7):2021. https://doi.org/10.3390/s26072021
Chicago/Turabian StyleYan, He, Zhenyu Wang, Liuming Lin, Jing Sun, and Shuanggen Liu. 2026. "A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT" Sensors 26, no. 7: 2021. https://doi.org/10.3390/s26072021
APA StyleYan, H., Wang, Z., Lin, L., Sun, J., & Liu, S. (2026). A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. Sensors, 26(7), 2021. https://doi.org/10.3390/s26072021

