Analysis of Zero -Key Authentication and Zero -Knowledge Proof

被引:2
作者
Lin, Huancheng [1 ]
Wang, Zhehan [2 ]
Xu, Tong [3 ]
Zhou, Shanyue [4 ]
Hong, Yang [5 ]
Huang, Jun [6 ]
机构
[1] Shanghai Univ Finance & Econ, Dept Math, Shanghai, Peoples R China
[2] Univ Liverpool, Dept Math, Liverpool, Merseyside, England
[3] East China Nounal Univ, Dept SE, Shanghai, Peoples R China
[4] McGill Univ, Dept Comp, Montreal, PQ, Canada
[5] InBay Technol Inc, Dept R&D, Ottawa, ON, Canada
[6] Carleton Univ, Dept Syst, Ottawa, ON, Canada
来源
2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC | 2022年
关键词
Bi-ideal; Isomorphism Lattice; Multivariate; Post-Quantum Cryptograph; Public Key Infrastructure;
D O I
10.1109/CyberC55534.2022.00012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently passwordless authentication such as zero-key authentication or zero -knowledge access control is becoming popular among businesses prioritizing their users' and employees' security and digital experience. A challenge-response mechanism and public key infrastructure (PKI) cryptography are employed to perform the zero-key authentication or zero knowledge access control that authorizes user access to an online service without a password or any shared secret required. Using a large quantum computer, a quantum algorithm could break the hard mathematical problems underlying PKI. The National Institute of Standards and Technology (NIST) has launched a program and competition to standardize one or more post-quantum cryptographic (PQC) algorithms to fight against quantum attacks. In this paper, we have conducted the first-ever mathematical analysis of lattice -based and polynomial-based PQC by introducing the relationship between automorphism and homomorphism. This analysis can help enterprises and organizations leverage NIST-selected PQC algorithms to safeguard their online services from quantum attacks. We performed the simulation to illustrate brute force broken probability for polynomial-based or multivariate-based PQC to validate our mathematical analysis of PQC.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 20 条
  • [1] A Zero-Knowledge Proof System with Algebraic Geometry Techniques
    Gonzalez Fernandez, Edgar
    Morales-Luna, Guillermo
    Sagols, Feliu
    APPLIED SCIENCES-BASEL, 2020, 10 (02):
  • [2] Bridge certification authorities:: Connecting B2B public key infrastructure with pak and zero-knowledge proof
    Torrellas, GAS
    Domínguez, AT
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 182 - 187
  • [3] Efficient Implementation of Entity On-Boarding and Authentication in Zero-Trust Systems
    Rana, Jayashree
    Meher, Pramod Kumar
    Priyadarshini, Rojalina
    Rao, K. Pratyush
    2024 IEEE INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS, PKIA 2024, 2024,
  • [4] Non-zero sum games and survivable malware
    Young, A
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 24 - 29
  • [5] Universally Composable Authentication and Key-Exchange with Global PKI
    Canetti, Ran
    Shahaf, Daniel
    Vald, Margarita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 265 - 296
  • [6] Sufficient Reduction Method for Bivariate Zero-Inflated Poisson Process
    Hinsheranan, Sawaporn
    INTERNATIONAL JOURNAL OF ANALYSIS AND APPLICATIONS, 2024, 22
  • [7] Blockchain-based secret key extraction for efficient and secure authentication in VANETs
    Shawky, Mahmoud A.
    Usman, Muhammad
    Flynn, David
    Imran, Muhammad Ali
    Abbasi, Qammer H.
    Ansari, Shuja
    Taha, Ahmad
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [8] Efficient Blockchain-Based Group Key Distribution for Secure Authentication in VANETs
    Shawky, Mahmoud A.
    Jabbar, Abdul
    Usman, Muhammad
    Imran, Muhammad
    Abbasi, Qammer H.
    Ansari, Shuja
    Taha, Ahmad
    IEEE Networking Letters, 2023, 5 (01): : 64 - 68
  • [9] The Proposed Public Key Infrastructure Authentication Framework (PKIAF) for Malaysian Government Agencies
    Nor, Noraida Aman
    Samy, Ganthan Narayana
    Ahmad, Rabiah
    Ibrahim, Roslina
    Maarop, Nurazean
    ADVANCED SCIENCE LETTERS, 2015, 21 (10) : 3161 - 3164
  • [10] Applicability of LTE Public Key Infrastructure based device authentication in Industrial Plants
    Ray, Apala
    Akerberg, Johan
    Bjorkman, Mats
    Blom, Rolf
    Gidlund, Mikael
    39TH ANNUAL IEEE COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2015), VOL 2, 2015, : 510 - 515