Analysis of Zero -Key Authentication and Zero -Knowledge Proof

被引:2
|
作者
Lin, Huancheng [1 ]
Wang, Zhehan [2 ]
Xu, Tong [3 ]
Zhou, Shanyue [4 ]
Hong, Yang [5 ]
Huang, Jun [6 ]
机构
[1] Shanghai Univ Finance & Econ, Dept Math, Shanghai, Peoples R China
[2] Univ Liverpool, Dept Math, Liverpool, Merseyside, England
[3] East China Nounal Univ, Dept SE, Shanghai, Peoples R China
[4] McGill Univ, Dept Comp, Montreal, PQ, Canada
[5] InBay Technol Inc, Dept R&D, Ottawa, ON, Canada
[6] Carleton Univ, Dept Syst, Ottawa, ON, Canada
关键词
Bi-ideal; Isomorphism Lattice; Multivariate; Post-Quantum Cryptograph; Public Key Infrastructure;
D O I
10.1109/CyberC55534.2022.00012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently passwordless authentication such as zero-key authentication or zero -knowledge access control is becoming popular among businesses prioritizing their users' and employees' security and digital experience. A challenge-response mechanism and public key infrastructure (PKI) cryptography are employed to perform the zero-key authentication or zero knowledge access control that authorizes user access to an online service without a password or any shared secret required. Using a large quantum computer, a quantum algorithm could break the hard mathematical problems underlying PKI. The National Institute of Standards and Technology (NIST) has launched a program and competition to standardize one or more post-quantum cryptographic (PQC) algorithms to fight against quantum attacks. In this paper, we have conducted the first-ever mathematical analysis of lattice -based and polynomial-based PQC by introducing the relationship between automorphism and homomorphism. This analysis can help enterprises and organizations leverage NIST-selected PQC algorithms to safeguard their online services from quantum attacks. We performed the simulation to illustrate brute force broken probability for polynomial-based or multivariate-based PQC to validate our mathematical analysis of PQC.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [31] A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication
    Zhao, Xinjian
    Xia, Fei
    Xia, Hanning
    Mao, Yunlong
    Chen, Shi
    ELECTRONICS, 2024, 13 (14)
  • [32] Channel characteristics aware zero knowledge proof based authentication scheme in body area networks
    Umar, Mubarak
    Wu, Zhenqiang
    Liao, Xuening
    AD HOC NETWORKS, 2021, 112
  • [33] Aggregated Zero-Knowledge Proof and Blockchain-Empowered Authentication for Autonomous Truck Platooning
    Li, Wanxin
    Meese, Collin
    Guo, Hao
    Nejad, Mark
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (09) : 9309 - 9323
  • [34] Zero-Knowledge and Identity-Based Authentication and Key Exchange for Internet of Things
    Simsek, Irfan
    Rathgeb, Erwin P.
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 283 - 288
  • [35] ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system
    Wided Boubakri
    Walid Abdallah
    Noureddine Boudriga
    Wireless Networks, 2021, 27 : 4199 - 4215
  • [36] ZAO-AKA : a zero knowledge proof chaotic authentication and key agreement scheme for securing smart city cyber physical system
    Boubakri, Wided
    Abdallah, Walid
    Boudriga, Noureddine
    WIRELESS NETWORKS, 2021, 27 (06) : 4199 - 4215
  • [37] Physical Zero-Knowledge Proof for Sukoro
    Sasaki, Shun
    Shinagawa, Kazumasa
    NEW GENERATION COMPUTING, 2024, 42 (03) : 381 - 398
  • [38] On the composition of zero-knowledge proof systems
    Goldreich, O
    Krawczyk, H
    SIAM JOURNAL ON COMPUTING, 1996, 25 (01) : 169 - 192
  • [39] A Survey on Zero-Knowledge Proof in Blockchain
    Sun, Xiaoqiang
    Yu, F. Richard
    Zhang, Peng
    Sun, Zhiwei
    Xie, Weixin
    Peng, Xiang
    IEEE NETWORK, 2021, 35 (04): : 198 - 205
  • [40] ZERO-KNOWLEDGE PROOF SYSTEMS FOR QMA
    Broadbent, Anne
    Ji, Zhengfeng
    Song, Fang
    Watrous, John
    SIAM JOURNAL ON COMPUTING, 2020, 49 (02) : 245 - 283