Towards Quantum-Secure Authentication and Key Agreement via Abstract
Multi-Agent Interaction
- URL: http://arxiv.org/abs/2007.09327v2
- Date: Fri, 9 Jul 2021 16:13:41 GMT
- Title: Towards Quantum-Secure Authentication and Key Agreement via Abstract
Multi-Agent Interaction
- Authors: Ibrahim H. Ahmed, Josiah P. Hanna, Elliot Fosong, and Stefano V.
Albrecht
- Abstract summary: Current methods for authentication and key agreement based on public-key cryptography are vulnerable to quantum computing.
We propose a novel approach based on artificial intelligence research in which communicating parties are viewed as autonomous agents.
We release PyAMI, a prototype authentication and key agreement system based on the proposed method.
- Score: 7.673465837624366
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Current methods for authentication and key agreement based on public-key
cryptography are vulnerable to quantum computing. We propose a novel approach
based on artificial intelligence research in which communicating parties are
viewed as autonomous agents which interact repeatedly using their private
decision models. Authentication and key agreement are decided based on the
agents' observed behaviors during the interaction. The security of this
approach rests upon the difficulty of modeling the decisions of interacting
agents from limited observations, a problem which we conjecture is also hard
for quantum computing. We release PyAMI, a prototype authentication and key
agreement system based on the proposed method. We empirically validate our
method for authenticating legitimate users while detecting different types of
adversarial attacks. Finally, we show how reinforcement learning techniques can
be used to train server models which effectively probe a client's decisions to
achieve more sample-efficient authentication.
Related papers
- Self-Supervised Inference of Agents in Trustless Environments [44.99833362998488]
We propose a novel approach where agents can form swarms to produce high-quality responses effectively.
This is accomplished by utilizing agents capable of data inference and ranking.
We show that our approach is an order of magnitude faster than other trustless inference strategies reaching less than 125 ms validation latency.
arXiv Detail & Related papers (2024-09-12T20:32:07Z) - Simultaneous quantum identity authentication scheme utilizing entanglement swapping with secret key preservation [0.0]
We introduce a new protocol for quantum identity authentication (QIA)
Our proposed scheme facilitates simultaneous authentication between two users, Alice and Bob, leveraging Bell states with the assistance of a third party, Charlie.
We demonstrate that the proposed protocol withstands various known attacks, including impersonation, intercept and resend and impersonated fraudulent attacks.
arXiv Detail & Related papers (2024-05-23T18:40:15Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Conformal Policy Learning for Sensorimotor Control Under Distribution
Shifts [61.929388479847525]
This paper focuses on the problem of detecting and reacting to changes in the distribution of a sensorimotor controller's observables.
The key idea is the design of switching policies that can take conformal quantiles as input.
We show how to design such policies by using conformal quantiles to switch between base policies with different characteristics.
arXiv Detail & Related papers (2023-11-02T17:59:30Z) - Online Decision Mediation [72.80902932543474]
Consider learning a decision support assistant to serve as an intermediary between (oracle) expert behavior and (imperfect) human behavior.
In clinical diagnosis, fully-autonomous machine behavior is often beyond ethical affordances.
arXiv Detail & Related papers (2023-10-28T05:59:43Z) - Adversarial Client Detection via Non-parametric Subspace Monitoring in
the Internet of Federated Things [3.280202415151067]
Internet of Federated Things (IoFT) represents a network of interconnected systems with federated learning as the backbone.
We propose an effective non-parametric approach FedRR to address the adversarial attack problem.
Our proposed method is capable of accurately detecting adversarial clients and controlling the false alarm rate under the scenario with no attack occurring.
arXiv Detail & Related papers (2023-10-02T18:25:02Z) - Interactive System-wise Anomaly Detection [66.3766756452743]
Anomaly detection plays a fundamental role in various applications.
It is challenging for existing methods to handle the scenarios where the instances are systems whose characteristics are not readily observed as data.
We develop an end-to-end approach which includes an encoder-decoder module that learns system embeddings.
arXiv Detail & Related papers (2023-04-21T02:20:24Z) - H-SAUR: Hypothesize, Simulate, Act, Update, and Repeat for Understanding
Object Articulations from Interactions [62.510951695174604]
"Hypothesize, Simulate, Act, Update, and Repeat" (H-SAUR) is a probabilistic generative framework that generates hypotheses about how objects articulate given input observations.
We show that the proposed model significantly outperforms the current state-of-the-art articulated object manipulation framework.
We further improve the test-time efficiency of H-SAUR by integrating a learned prior from learning-based vision models.
arXiv Detail & Related papers (2022-10-22T18:39:33Z) - Authenticated Multiparty Quantum Key Agreement for Optical-Ring Quantum
Communication Networks [7.753213765615376]
In the key agreement protocols, an attacker can impersonate a legal user to participate in the negotiation process and eavesdrop the agreement key easily.
This is often overlooked in most quantum key agreement protocols, which makes them insecure in practical implementation.
Considering this problem, the function of authenticating the user's identity is added in the proposed protocol.
arXiv Detail & Related papers (2021-12-15T07:16:09Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.