Score: 0

Extensible Post Quantum Cryptography Based Authentication

Published: May 22, 2025 | arXiv ID: 2505.16112v1

By: Homer A. Riva-Cambrin , Rahul Singh , Sanju Lama and more

Potential Business Impact:

Secures online secrets from future quantum computers.

Business Areas:
Quantum Computing Science and Engineering

Cryptography underpins the security of modern digital infrastructure, from cloud services to health data. However, many widely deployed systems will become vulnerable after the advent of scalable quantum computing. Although quantum-safe cryptographic primitives have been developed, such as lattice-based digital signature algorithms (DSAs) and key encapsulation mechanisms (KEMs), their unique structural and performance characteristics make them unsuitable for existing protocols. In this work, we introduce a quantum-safe single-shot protocol for machine-to-machine authentication and authorization that is specifically designed to leverage the strengths of lattice-based DSAs and KEMs. Operating entirely over insecure channels, this protocol enables the forward-secure establishment of tokens in constrained environments. By demonstrating how new quantum-safe cryptographic primitives can be incorporated into secure systems, this study lays the groundwork for scalable, resilient, and future-proof identity infrastructures in a quantum-enabled world.

Page Count
20 pages

Category
Computer Science:
Cryptography and Security