PQ-Lattice: A Lattice-Based Post-Quantum Authentication Protocol for Decentralized IoT Systems
Abstract
Conventional Asymmetrical RSA and ECC chord cryptosystems have the horns of a dilemma due to the advent of quantum computers. In this paper, we introduce PQ-Lattice-a decentralized lattice-based postquantum authenticated key exchange protocol for IoT. The protocol uses CRYSTALS-Kyber for key encapsulationand CRYSTALS-Dilithium for digital signatures in a blockchain empowered identity management framework providing decentralization, mutual authentication and fine grained revocation without the dependence on trusted authority. Extensive performance evaluation on an ARM Cortex-M4 device shows that PQ-Lattice has the average computation time of 32.4 ms, communication overhead of 3.5 KB andstorage cost of 44 KB, which consumes around 28 mJ for a single authentication round. This result has demonstrated the feasibility in terms of power consumption for the constrained IoT nodes compared with traditional ECC and RSA, where latency is reduced up to 45% while energy efficiency increases by 47%. Security proof under the hardness of Module-LWE is given showing resilience against classical, as well asquantum attacks (replay, impersonation and Sybil). The presented PQ-Lattice architecture is therefore an efficient (in terms of scalability, and energy consumption) quantum-resilient authentication answer tailored to the next generation IoT platform.References
X. Mu and M. F. Antwi-Afari, “The applications
of internet of things (iot) in industrial manage-
ment: a science mapping review,” International
Journal of Production Research, vol. 62, no. 5,
pp. 1928–1952, 2024.
K. Sharma and S. K. Shivandu, “Integrating ar-
tificial intelligence and internet of things (iot)
for enhanced crop monitoring and management
in precision agriculture,” Sensors International,
vol. 5, p. 100292, 2024.
Q. A. Al-Haija and A. Droos, “A comprehensive
survey on deep learning-based intrusion detection
systems in internet of things (iot),” Expert Sys-
tems, vol. 42, no. 2, p. e13726, 2025.
S. Cherbal, A. Zier, S. Hebal, L. Louail, and
B. Annane, “Security in internet of things: a
review on approaches based on blockchain, ma-
chine learning, cryptography, and quantum com-
puting,” The Journal of Supercomputing, vol. 80,
no. 3, pp. 3738–3816, 2024.
A. E. Adeniyi, R. G. Jimoh, and J. B. Awotunde,
“A systematic review on elliptic curve cryptogra-
phy algorithm for internet of things: Categoriza-
tion, application areas, and security,” Computers
and Electrical Engineering, vol. 118, p. 109330,
DOI:
https://doi.org/10.31449/inf.v49i35.12156Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright in their work. By submitting to and publishing with Informatica, authors grant the publisher (Slovene Society Informatika) the non-exclusive right to publish, reproduce, and distribute the article and to identify itself as the original publisher.
All articles are published under the Creative Commons Attribution license CC BY 3.0. Under this license, others may share and adapt the work for any purpose, provided appropriate credit is given and changes (if any) are indicated.
Authors may deposit and share the submitted version, accepted manuscript, and published version, provided the original publication in Informatica is properly cited.







