Analysis of Zero -Key Authentication and Zero -Knowledge Proof

被引:2
|
作者
Lin, Huancheng [1 ]
Wang, Zhehan [2 ]
Xu, Tong [3 ]
Zhou, Shanyue [4 ]
Hong, Yang [5 ]
Huang, Jun [6 ]
机构
[1] Shanghai Univ Finance & Econ, Dept Math, Shanghai, Peoples R China
[2] Univ Liverpool, Dept Math, Liverpool, Merseyside, England
[3] East China Nounal Univ, Dept SE, Shanghai, Peoples R China
[4] McGill Univ, Dept Comp, Montreal, PQ, Canada
[5] InBay Technol Inc, Dept R&D, Ottawa, ON, Canada
[6] Carleton Univ, Dept Syst, Ottawa, ON, Canada
关键词
Bi-ideal; Isomorphism Lattice; Multivariate; Post-Quantum Cryptograph; Public Key Infrastructure;
D O I
10.1109/CyberC55534.2022.00012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently passwordless authentication such as zero-key authentication or zero -knowledge access control is becoming popular among businesses prioritizing their users' and employees' security and digital experience. A challenge-response mechanism and public key infrastructure (PKI) cryptography are employed to perform the zero-key authentication or zero knowledge access control that authorizes user access to an online service without a password or any shared secret required. Using a large quantum computer, a quantum algorithm could break the hard mathematical problems underlying PKI. The National Institute of Standards and Technology (NIST) has launched a program and competition to standardize one or more post-quantum cryptographic (PQC) algorithms to fight against quantum attacks. In this paper, we have conducted the first-ever mathematical analysis of lattice -based and polynomial-based PQC by introducing the relationship between automorphism and homomorphism. This analysis can help enterprises and organizations leverage NIST-selected PQC algorithms to safeguard their online services from quantum attacks. We performed the simulation to illustrate brute force broken probability for polynomial-based or multivariate-based PQC to validate our mathematical analysis of PQC.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] DIZK: A Distributed Zero Knowledge Proof System
    Wu, Howard
    Zheng, Wenting
    Chiesa, Alessandro
    Popa, Raluca Ada
    Stoica, Ion
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 675 - 692
  • [42] ON THE COMPOSITION OF ZERO-KNOWLEDGE PROOF SYSTEMS
    GOLDREICH, O
    KRAWCZYK, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 443 : 268 - 282
  • [43] MULTILANGUAGE ZERO KNOWLEDGE INTERACTIVE PROOF SYSTEMS
    KUROSAWA, K
    TSUJII, S
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 537 : 339 - 352
  • [44] Memorizable interactive proof and zero-knowledge proof systems
    Chen, N
    Rong, JW
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 936 - 941
  • [45] Physical Zero-Knowledge Proof for Makaro
    Bultel, Xavier
    Dreier, Jannik
    Dumas, Jean-Guillaume
    Lafourcade, Pascal
    Miyahara, Daiki
    Mizuki, Takaaki
    Nagao, Atsuki
    Sasaki, Tatsuya
    Shinagawa, Kazumasa
    Sone, Hideaki
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2018, 2018, 11201 : 111 - 125
  • [46] Memorizable interactive proof and zero-knowledge proof systems
    Ning Chen
    Jia-Wei Rong
    Journal of Computer Science and Technology, 2004, 19 : 936 - 941
  • [47] Two-factor authentication for intellectual property transactions based on improved zero-knowledge proof
    Shilong Mo
    Wenlong Feng
    Mengxing Huang
    Siling Feng
    Zheng Wang
    Yunhong Li
    Scientific Reports, 15 (1)
  • [48] TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks
    Limin Ma
    Yu Ge
    Yuesheng Zhu
    Wireless Personal Communications, 2014, 77 : 1077 - 1090
  • [49] TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks
    Ma, Limin
    Ge, Yu
    Zhu, Yuesheng
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) : 1077 - 1090
  • [50] A zero knowledge password proof mutual authentication technique against real-time phishing attacks
    Sharifi, Mohsen
    Saberi, Alireza
    Vahidi, Mojtaba
    Zorufi, Mohammad
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 254 - 258