TY - GEN
T1 - Post Quantum Communication Over the Internet Infrastructure
AU - Dolev, Shlomi
N1 - Publisher Copyright: © 2024 Owner/Author.
PY - 2024/1/4
Y1 - 2024/1/4
N2 - The need for a post-quantum Internet is emerging, and this is a great opportunity to re-examine the legacy of public key infrastructure. There is a need for perspective on the evolution of cryptography over the years, including the perfect information theoretical secure schemes and the computationally secure schemes, in particular. There is also a need to examine the evolved Internet infrastructure to identify and design efficient and secure cryptographic schemes over the existing Internet infrastructure. A combination of overlay security, Blockchain, and Merkle trees with Lamport's signatures implies such an easily implementable post quantum Internet. The tutorial covers the basics of post-quantum techniques, one-time-pad (OTP), secret-sharing (SS), secure multi-party computation (SMPC), zero-knowledge proof (ZKP) based on SMPC in the head, Hash (SHA) based stateless signature (HBSS), Symmetric encryption (AES), Asymmetric encryption (SVP), and post-quantum Blockchain.
AB - The need for a post-quantum Internet is emerging, and this is a great opportunity to re-examine the legacy of public key infrastructure. There is a need for perspective on the evolution of cryptography over the years, including the perfect information theoretical secure schemes and the computationally secure schemes, in particular. There is also a need to examine the evolved Internet infrastructure to identify and design efficient and secure cryptographic schemes over the existing Internet infrastructure. A combination of overlay security, Blockchain, and Merkle trees with Lamport's signatures implies such an easily implementable post quantum Internet. The tutorial covers the basics of post-quantum techniques, one-time-pad (OTP), secret-sharing (SS), secure multi-party computation (SMPC), zero-knowledge proof (ZKP) based on SMPC in the head, Hash (SHA) based stateless signature (HBSS), Symmetric encryption (AES), Asymmetric encryption (SVP), and post-quantum Blockchain.
KW - Blockchain
KW - Cryptology
KW - Digital Signature
KW - Internet
KW - Post-quantum
KW - Secret-sharing
KW - Security
KW - Zero-Knowledge-Proofs
UR - http://www.scopus.com/inward/record.url?scp=85184288210&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/3631461.3632514
DO - https://doi.org/10.1145/3631461.3632514
M3 - Conference contribution
T3 - ACM International Conference Proceeding Series
SP - 1
EP - 3
BT - ICDCN 2024 - Proceedings of the 25th International Conference on Distributed Computing and Networking
T2 - 25th International Conference on Distributed Computing and Networking, ICDCN 2024
Y2 - 4 January 2024 through 7 January 2024
ER -