Analysis of Zero -Key Authentication and Zero -Knowledge Proof

被引:2
|
作者
Lin, Huancheng [1 ]
Wang, Zhehan [2 ]
Xu, Tong [3 ]
Zhou, Shanyue [4 ]
Hong, Yang [5 ]
Huang, Jun [6 ]
机构
[1] Shanghai Univ Finance & Econ, Dept Math, Shanghai, Peoples R China
[2] Univ Liverpool, Dept Math, Liverpool, Merseyside, England
[3] East China Nounal Univ, Dept SE, Shanghai, Peoples R China
[4] McGill Univ, Dept Comp, Montreal, PQ, Canada
[5] InBay Technol Inc, Dept R&D, Ottawa, ON, Canada
[6] Carleton Univ, Dept Syst, Ottawa, ON, Canada
来源
2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC | 2022年
关键词
Bi-ideal; Isomorphism Lattice; Multivariate; Post-Quantum Cryptograph; Public Key Infrastructure;
D O I
10.1109/CyberC55534.2022.00012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently passwordless authentication such as zero-key authentication or zero -knowledge access control is becoming popular among businesses prioritizing their users' and employees' security and digital experience. A challenge-response mechanism and public key infrastructure (PKI) cryptography are employed to perform the zero-key authentication or zero knowledge access control that authorizes user access to an online service without a password or any shared secret required. Using a large quantum computer, a quantum algorithm could break the hard mathematical problems underlying PKI. The National Institute of Standards and Technology (NIST) has launched a program and competition to standardize one or more post-quantum cryptographic (PQC) algorithms to fight against quantum attacks. In this paper, we have conducted the first-ever mathematical analysis of lattice -based and polynomial-based PQC by introducing the relationship between automorphism and homomorphism. This analysis can help enterprises and organizations leverage NIST-selected PQC algorithms to safeguard their online services from quantum attacks. We performed the simulation to illustrate brute force broken probability for polynomial-based or multivariate-based PQC to validate our mathematical analysis of PQC.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [21] ZKPAUTH: An Authentication Scheme Based Zero-Knowledge Proof for Software Defined Network
    Mutaher, Hamza
    Kumar, Pradeep
    ARTIFICIAL INTELLIGENCE AND SUSTAINABLE COMPUTING FOR SMART CITY, AIS2C2 2021, 2021, 1434 : 105 - 120
  • [22] Anonymous Authentication and Information Sharing Scheme Based on Blockchain and Zero Knowledge Proof for VANETs
    Zhang, Xiaohong
    Chen, Xingxing
    Liu, Shuling
    Zhong, Shaojiang
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) : 18043 - 18058
  • [23] A novel zero knowledge proof of retrievability
    Yang, Dexin
    Liu, Liming
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2020, 13 (01) : 1 - 10
  • [24] Practical Security Analysis of Zero-Knowledge Proof Circuits
    Wen, Hongbo
    Stephens, Jon
    Chen, Yanju
    Ferles, Kostas
    Pailoor, Shankara
    Charbonnet, Kyle
    Dillig, Isil
    Feng, Yu
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 1471 - 1487
  • [25] Analysis and comparison of the main zero-knowledge proof scheme
    Gong, Yinjie
    Jin, Yifei
    Li, Yuchan
    Liu, Ziyi
    Zhu, Zhiyi
    2022 INTERNATIONAL CONFERENCE ON BIG DATA, INFORMATION AND COMPUTER NETWORK (BDICN 2022), 2022, : 366 - 372
  • [26] A Design of Secure Authentication Method Using Zero Knowledge Proof in Smart-Home Environment
    Park, Geunil
    Kim, Bumryoung
    Jun, Moon-seog
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 215 - 220
  • [27] Lightweight Zero Knowledge Authentication for Internt of Things
    Beydemir, Alican
    Sogukpinar, Ibrahim
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 360 - 365
  • [28] Zero-knowledge hierarchical authentication in MANETs
    Caballero-Gil, P
    Hernández-Goya, C
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (03): : 1288 - 1289
  • [29] A Privacy-Preserving Biometric Authentication System With Binary Classification in a Zero Knowledge Proof Protocol
    Quang Nhat Tran
    Turnbull, Benjamin Peter
    Wang, Min
    Hu, Jiankun
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2022, 3 : 1 - 10
  • [30] A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication
    Zhao, Xinjian
    Xia, Fei
    Xia, Hanning
    Mao, Yunlong
    Chen, Shi
    ELECTRONICS, 2024, 13 (14)