Secure Mobile Authentication With Blockchain Utilizing Ecc, Zkps, and Post- Quantum Cryptography

Read the full article See related articles

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

The increasing reliance on smartphones for sensitive transactions has underscored the urgent need for robust authentication methods in mobile applications, especially in sectors such as finance and legal services. Traditional authentication mechanisms frequently fail to meet high-security standards due to inadequate integration of advanced biometric credentials. This paper presents a Blockchain-based Triple-Layer Authentication (TLA) system that enhances mobile security by integrating PIN/passwords, one-time passwords (OTPs), and biometric data through advanced cryptographic techniques, including Elliptic Curve Cryptography (ECC), Zero-Knowledge Proofs (ZKPs), and Post-Quantum Cryptography. By employing Distributed Ledger Technology (DLT) for the secure storage of encrypted user credentials, the TLA system not only improves security but also safeguards user privacy. The model addresses the key elements of knowledge, possession, and inherent user traits, significantly strengthening user authentication. A thorough complexity analysis indicates that ECC is optimal for mobile environments due to its low computational overhead, while the shuffling mechanism operates with a complexity of \(\:O\left(n\:log\:n\right)\), making it feasible for mobile devices. Additionally, Non-Interactive Zero-Knowledge Proofs (NIZK’s) and Bulletproofs ensure efficient ZKP processes, and while Post-Quantum ZKPs offer necessary future-proofing against quantum threats, they may require further optimization for practical use on mobile platforms. The implementation of the TLA model demonstrates its effectiveness and reliability in enhancing mobile service security through comprehensive testing and validation in real-world scenarios. This study provides a comparative analysis with existing solutions and identifies avenues for future improvements, establishing the TLA model as a robust and innovative approach to contemporary authentication challenges in the digital landscape.

Article activity feed