Analysis of Zero -Key Authentication and Zero -Knowledge Proof

被引:2
|
作者
Lin, Huancheng [1 ]
Wang, Zhehan [2 ]
Xu, Tong [3 ]
Zhou, Shanyue [4 ]
Hong, Yang [5 ]
Huang, Jun [6 ]
机构
[1] Shanghai Univ Finance & Econ, Dept Math, Shanghai, Peoples R China
[2] Univ Liverpool, Dept Math, Liverpool, Merseyside, England
[3] East China Nounal Univ, Dept SE, Shanghai, Peoples R China
[4] McGill Univ, Dept Comp, Montreal, PQ, Canada
[5] InBay Technol Inc, Dept R&D, Ottawa, ON, Canada
[6] Carleton Univ, Dept Syst, Ottawa, ON, Canada
关键词
Bi-ideal; Isomorphism Lattice; Multivariate; Post-Quantum Cryptograph; Public Key Infrastructure;
D O I
10.1109/CyberC55534.2022.00012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently passwordless authentication such as zero-key authentication or zero -knowledge access control is becoming popular among businesses prioritizing their users' and employees' security and digital experience. A challenge-response mechanism and public key infrastructure (PKI) cryptography are employed to perform the zero-key authentication or zero knowledge access control that authorizes user access to an online service without a password or any shared secret required. Using a large quantum computer, a quantum algorithm could break the hard mathematical problems underlying PKI. The National Institute of Standards and Technology (NIST) has launched a program and competition to standardize one or more post-quantum cryptographic (PQC) algorithms to fight against quantum attacks. In this paper, we have conducted the first-ever mathematical analysis of lattice -based and polynomial-based PQC by introducing the relationship between automorphism and homomorphism. This analysis can help enterprises and organizations leverage NIST-selected PQC algorithms to safeguard their online services from quantum attacks. We performed the simulation to illustrate brute force broken probability for polynomial-based or multivariate-based PQC to validate our mathematical analysis of PQC.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Zero-Knowledge Proof Authentication Protocols
    Ratseev, S. M.
    Rostov, M. A.
    IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA, 2019, 19 (01): : 114 - 121
  • [2] An authentication protocol based on chaos and zero knowledge proof
    Will Major
    William J. Buchanan
    Jawad Ahmad
    Nonlinear Dynamics, 2020, 99 : 3065 - 3087
  • [3] An authentication protocol based on chaos and zero knowledge proof
    Major, Will
    Buchanan, William J.
    Ahmad, Jawad
    NONLINEAR DYNAMICS, 2020, 99 (04) : 3065 - 3087
  • [4] Web Authentication Protocol Using Zero Knowledge Proof
    Thiruvaazhi, U.
    Divya, R.
    INFORMATION SECURITY JOURNAL, 2011, 20 (02): : 112 - 121
  • [5] Adaptive Authentication Protocol Based on Zero-Knowledge Proof
    Chistousov, Nikita Konstantinovich
    Kalmykov, Igor Anatolyevich
    Dukhovnyj, Daniil Vyacheslavovich
    Kalmykov, Maksim Igorevich
    Olenev, Aleksandr Anatolyevich
    ALGORITHMS, 2022, 15 (02)
  • [6] A Distributed Authentication Scheme Based on Zero-knowledge Proof
    Qin, Lang
    Ma, Feng
    Xie, Hao Geng
    Zhang, Sheng Li
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS AND COMPUTER ENGINEERING (ICCECE), 2021, : 203 - 207
  • [7] GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF
    Shliakhtina, E. A.
    Gamayunov, D. Y.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2021, (51): : 68 - 84
  • [8] Zero-Knowledge Authentication Scheme with Secret Key Exchange
    Jorgen Brandt
    Ivan Damgård
    Peter Landrock
    Torben Pedersen
    Journal of Cryptology, 1998, 11 : 147 - 159
  • [9] ZERO-KNOWLEDGE AUTHENTICATION SCHEME WITH SECRET KEY EXCHANGE
    BRANDT, J
    DAMGARD, I
    LANDROCK, P
    PEDERSEN, T
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 583 - 588
  • [10] Zero-knowledge authentication scheme with secret key exchange
    Brandt, J
    Damgard, I
    Landrock, P
    Pedersen, T
    JOURNAL OF CRYPTOLOGY, 1998, 11 (03) : 147 - 159