Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology

被引:2
作者
Henge, Santosh Kumar [1 ]
Jayaraman, Gitanjali [2 ]
Sreedevi, M. [3 ]
Rajakumar, R. [3 ]
Rashid, Mamoon [4 ]
Alshamrani, Sultan S. [5 ]
Alnfiai, Mrim M. [5 ]
AlGhamdi, Ahmed Saeed [6 ]
机构
[1] Manipal Univ Jaipur, Dept Comp Applicat, Directorate Online Educ, Jaipur, Rajasthan, India
[2] Vellore Inst Technol, Dept Informat Technol, Vellore 632014, India
[3] Madanapalle Inst Technol & Sci, Dept Comp Sci & Technol, Madanapalle 517325, India
[4] Vishwakarma Univ, Fac Sci & Technol, Dept Comp Engn, Pune 411048, India
[5] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, POB 11099, Taif 21944, Saudi Arabia
[6] Taif Univ, Coll Comp & Informat Technol, Dept Comp Engn, POB 11099, Taif 21994, Saudi Arabia
关键词
secure keys; quantum cryptography; artificial intelligence; homomorphic cryptosystem; public key; quantum digital signature; UNCONDITIONAL SECURITY; BLOCKCHAIN; PROTOCOL;
D O I
10.3934/nhm.2023057
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.
引用
收藏
页码:1313 / 1334
页数:22
相关论文
共 44 条
[1]   Secure quantum signatures using insecure quantum channels [J].
Amiri, Ryan ;
Wallden, Petros ;
Kent, Adrian ;
Andersson, Erika .
PHYSICAL REVIEW A, 2016, 93 (03)
[2]  
[Anonymous], 2021, IMPL QUANT SAF KEY D
[3]  
[Anonymous], 2023, DAT SEC CHALL
[4]  
[Anonymous], 2018, Advantages and Disadvantages of Descriptive Research
[5]   No signaling and quantum key distribution [J].
Barrett, J ;
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2005, 95 (01)
[6]   Demonstration of Blind Quantum Computing [J].
Barz, Stefanie ;
Kashefi, Elham ;
Broadbent, Anne ;
Fitzsimons, Joseph F. ;
Zeilinger, Anton ;
Walther, Philip .
SCIENCE, 2012, 335 (6066) :303-308
[7]  
Bernstein D. J., 2009, Post-Quantum Cryptography, P1, DOI DOI 10.1007/978-3-540-88702-7
[8]  
Brassard G, 2005, 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, P19
[9]  
Dhiman Pooja, 2022, Recent Innovations in Computing: Proceedings of ICRIC 2021. Lecture Notes in Electrical Engineering (855), P563, DOI 10.1007/978-981-16-8892-8_42
[10]  
Dhiman P., 2020, ICT COMPETITIVE STRA, P787