[irtf-discuss] Two-Factor Proof of Knowledge

Christian Liz-Fonts <christian.lfonts@gmail.com> Tue, 30 April 2019 16:00 UTC

Return-Path: <christian.lfonts@gmail.com>
X-Original-To: irtf-discuss@ietfa.amsl.com
Delivered-To: irtf-discuss@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A138120305 for <irtf-discuss@ietfa.amsl.com>; Tue, 30 Apr 2019 09:00:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iofkkzwfokT7 for <irtf-discuss@ietfa.amsl.com>; Tue, 30 Apr 2019 09:00:52 -0700 (PDT)
Received: from mail-lf1-x130.google.com (mail-lf1-x130.google.com [IPv6:2a00:1450:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 804DE1202FC for <irtf-discuss@irtf.org>; Tue, 30 Apr 2019 09:00:41 -0700 (PDT)
Received: by mail-lf1-x130.google.com with SMTP id j20so11315747lfh.2 for <irtf-discuss@irtf.org>; Tue, 30 Apr 2019 09:00:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=RGoSVtX/vPblydN4MzSVr+wgCX7OGeaAXNadD/fl1KE=; b=J/U0ZMKvJI+HN09VpfUdNVbgPY9VtU1u6aTzUqtoqvNyTATz7ds0UPewMZ/0EJR8gK M75zQ2IOMfsnvt2gxroredCU7RuFGsc0hm7zvIF+mV/UCMDBd2cJdexYxth6UXwmX9eM Mg4+iNmMigQzT3BtwKCMJ+xRVg+CPJ1KqJpPkgQX5++jjT19W6eAgLrQpu7TA3/GCa6t wMAsBSRVJRmFCLzI03mPaZxj53dmOXz4KhvcbEEOyIYfcvC+K6AWNHYAW5dd/l12R6Rf oOj3cOBTkEcc11FsEk0JjtLTM/r85fSkAatzdVu5T29ePnoiR2eDkZ9quiuOCmoCjtHC UB9A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=RGoSVtX/vPblydN4MzSVr+wgCX7OGeaAXNadD/fl1KE=; b=E1Cfhv8MAEbo4gc8+fiH/ObJNbWbejACJBF6P3GSNHcglz6jRkqVe+PW9ycLtctfUi 0s5zdm6c61IekTRn0L3rQKXQ+1DaK4te7EhHTPpkVIT2JYpk+fA4SF3xeJhM+VZtBJ7m wesYmYDYHRfwr1dVgROZxu/GYMexWinpX8Y3uZib9X2dfOBOGsakTEBC5RtQapd93hK/ oVb+0ruX2FmtfqGV9vBM9nlimHqBG0CJk5h6dEh69Ae41/RxFP3Kx1/FyAS01MmJP+mV 44XL36xgIPiGhwi5K4i3MQihWkaRBg6DuM5cQo6PVaCCqJ24ORcVoKM2Jhold5/u/XIq mDHw==
X-Gm-Message-State: APjAAAVF6/K9DiyQsDWwv9GbKz/BAv5Nou9m8A3BrcbI0dNBATMCMvCW Epy6e1RppLw51BvwdVp8TcunvvHL5NFFOnk+8yKTB+MRz1s=
X-Google-Smtp-Source: APXvYqwr4MjQVR+K6kgRfRP2PLob5fbe2bCEmV8YFB7BwB8q/vRvKj6svxLagtYzOkJy7PwZvIU/ZE6u7iy7Lx2ox2o=
X-Received: by 2002:a19:2814:: with SMTP id o20mr35774643lfo.117.1556640039275; Tue, 30 Apr 2019 09:00:39 -0700 (PDT)
MIME-Version: 1.0
References: <CAKDb_j6RKBCjRBGHJZh_AVE-kVmEFd0BO48nLnbEQPPumpEZ7A@mail.gmail.com>
In-Reply-To: <CAKDb_j6RKBCjRBGHJZh_AVE-kVmEFd0BO48nLnbEQPPumpEZ7A@mail.gmail.com>
From: Christian Liz-Fonts <christian.lfonts@gmail.com>
Date: Tue, 30 Apr 2019 12:00:23 -0400
Message-ID: <CAKDb_j5uz12O=MPON0gcbR+B19KJ_Aai77pgKX5oM0UkehG=ew@mail.gmail.com>
To: irtf-discuss@irtf.org
Content-Type: multipart/alternative; boundary="00000000000095906e0587c180f3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/irtf-discuss/MHYK54UEmLMsLagU7PzQ1WivhBU>
Subject: [irtf-discuss] Two-Factor Proof of Knowledge
X-BeenThere: irtf-discuss@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IRTF general and new-work discussion list <irtf-discuss.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/irtf-discuss>, <mailto:irtf-discuss-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/irtf-discuss/>
List-Post: <mailto:irtf-discuss@irtf.org>
List-Help: <mailto:irtf-discuss-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/irtf-discuss>, <mailto:irtf-discuss-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Apr 2019 16:01:01 -0000

Hi I would like to get some input on a quantum resistant signature based
algorithm in which I tried to email out in which you will find the details
on below, open to discussion.


Most Quantum Resistant Algorithms are bound to be sluggish due to the
complex computations used.

With digital signature cryptography being my focus and implementation into
blockchain the goal I have though of a suitable alternative called
Two-Factor Proof of Knowledge.

Simple and to the point thus removing any sluggish behavior seen in other
alternatives, which sticks to the saying why fix something that is not
broken?

One could say that a simple equation such as x+y=z can be quantum resistant
depending on the values used, so if a sha-256 is used as a value the
equation above would be quantum resistant.

Now what would happen when a users communicated over a distributed network
as seen in a blockchain how can one prevent common attacks from taking
place in a third  party system?

The answer is Two-Factor Proof of Knowledge or Factorized Proof of
Knowledge as the more factors there are the more functionalities one can
see in the signature being used.

The equation used in Two-Factor Proof of Knowledge is

x+e=y
x+y=z

In where revealing x would be the last step, something that is tied to both
equations.

“Scroda busts the myth that public-key cryptography on the blockchain is
more secure” by Scroda https://link.medium.com/3AMqHv0rgW

Would love to get some input on the matter.