Quantum-Resilient User-Evasive Cryptographic Authenticatuon (QRUECA) for WEB 3.0 Sec in the Post-Quantum Era Paper

dc.contributor.authorRaheman, Ali
dc.contributor.authorBhagat, Tejas
dc.contributor.authorRaheman, Fazal
dc.contributor.editorKais, Sabre
dc.contributor.editorSkala, Václav
dc.date.accessioned2025-10-08T14:33:28Z
dc.date.available2025-10-08T14:33:28Z
dc.date.issued2025
dc.description.abstract-translatedThe arrival of quantum computing (QC) is no longer a hypothetical concept. Google claims its new quantum computer is 241 million times faster than the one released in 2019, while the Chinese Zuchongzhi-3 claims to have achieved speeds trillions of times faster. The encryption-breaking speeds of QC will render our existing encryption obsolete within 5–10 years, presenting a catastrophic threat to our cryptography-dependent, ubiquitous digital infrastructure. Unless our digital infrastructure is secured from quantum threats, QC cannot become mainstream. In 2016-17, the National Institute of Standards and Technology (NIST) initiated a post-quantum cryptography (PQC) initiative; however, so far, it has failed to produce a stable standard, as all of the top 82 candidates have already been compromised. Moreover, PQC is expensive and too resource-intensive with latency issues, particularly in the $3 Trillion Crypto/blockchain economy that entirely relies on user-facing cryptography. In an earlier study, we disclosed Quantum-Safe Quantum Ledger Technology (QLT), a blockchain-agnostic framework for securing cryptocurrencies and blockchains from Q-Day threats. In this presentation, we discuss a Quantum Resilient user Evasive Cryptographic Authentication (QRUECA) protocol that secures QLT by replacing traditional user-facing PKI-based methods. QRUECA authorizes access through a multi-gate cryptographically sealed device-to-device handshake, thereby eliminating the need for the traditional user-facing cryptography. Because Gate 1 of the QRUECA process uses no user-facing cryptography, and Gate 2 is only activated by authenticated devices, the entire protocol becomes inherently resistant to threats from QC. Beyond blockchain, the QUERCA protocol can be applied to any Web 3.0 use case. Thus, QRUECA addresses a significant hurdle in the mainstream introduction of QC. Just as an automobile cannot exist without a braking system, quantum computers cannot exist without securing our life sustaining digital infrastructure.en
dc.format8 s.cs
dc.identifier.doihttp://www.doi.org/10.24132/CSRN.2025-A37
dc.identifier.issn2464-4617
dc.identifier.issn2464-4625
dc.identifier.urihttp://hdl.handle.net/11025/62929
dc.language.isoenen
dc.publisherVaclav Skala - UNION Agencyen
dc.rights© Václav Skala - UNION Agencyen
dc.rights.accessopenAccessen
dc.subjectkvantově odolná autentizacecs
dc.subjectpostkvantová kryptografie (PQC)cs
dc.subjectnulové výpočty zranitelností (ZVC)cs
dc.subjectkvantová technologiecs
dc.subject.translatedquantum-resilient authenticationen
dc.subject.translatedPost-Quantum Cryptography (PQC)en
dc.subject.translatedQuantum Ledger Technology (QLT)en
dc.subject.translatedZero Vulnerability Computing (ZVC)en
dc.titleQuantum-Resilient User-Evasive Cryptographic Authenticatuon (QRUECA) for WEB 3.0 Sec in the Post-Quantum Era Paperen
dc.typekonferenční příspěvekcs
dc.typeconferenceObjecten
dc.type.statusPeer revieweden
dc.type.versionpublishedVersionen
local.files.count2*
local.files.size3201837*
local.has.filesyes*

Files

Original bundle
Showing 1 - 2 out of 2 results
No Thumbnail Available
Name:
CSRN-QC-uvod.pdf
Size:
823.9 KB
Format:
Adobe Portable Document Format
No Thumbnail Available
Name:
A37.pdf
Size:
2.25 MB
Format:
Adobe Portable Document Format
License bundle
Showing 1 - 1 out of 1 results
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: