Submitted:
05 August 2025
Posted:
08 August 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- novel Hydraulic-Inspired Mathematical Framework: Introduction of a cryptographic protocol that leverages fluid dynamics equations to achieve security through natural mathematical structure rather than artificial cryptographic constructions.
- New Position-Based Nonce Mechanism: Development of a groundbreaking position-dependent differentiation system that provides unique identification and prevents replay attacks without requiring traditional cryptographic nonces or timestamps.
- Cyclic Verification Architecture: Design of an innovative neighbor-based validation system that creates mathematical interdependence among all participants, ensuring system integrity through distributed verification rather than centralized trust.
- Optimal Communication Complexity Achievement: Attainment of message complexity that represents the theoretical minimum for n-party verification protocols, providing novel improvements over existing quadratic and cubic alternatives.
- Comprehensive Security Analysis: Formal proof of good security properties including resistance against statistical attacks, complete immunity to timing-based attacks, and exceptional resilience against coordinated adversarial behavior.
- Practical Deployment Framework: Development of implementation guidelines and performance optimization strategies that enable real-world deployment across diverse application domains with significant efficiency.
2. Notation and Mathematical Framework
3. Related Work and Literature Review
3.1. Lightweight Authentication Protocols
3.2. Zero-Knowledge Authentication Systems
3.3. Commitment Schemes and Cryptographic Primitives
3.4. Secure Multi-Party Computation
3.5. Byzantine Agreement and Consensus Mechanisms
3.6. Blockchain and Distributed Ledger Technologies
3.7. Supply Chain Security and Verification
3.8. Internet of Things Security
4. Mass Flow Foundation for Mathematical Obfuscation
4.1. Physical Foundations of Mass Flow Systems
4.2. Cryptographic Adaptation of Hydraulic Principles
- Fluid Volume→ Position-adjusted weight
- Volumetric Flow Rate→ Flow parameter
- Fluid Density→ Density parameter
- Hydraulic Resistance→ Delay parameter
4.3. Mathematical Properties and Security Implications
4.4. Position-Based Differentiation Mechanism
5. Problem Statement and Formal Model
5.1. System Model and Assumptions
5.2. Adversarial Model and Threat Assumptions
5.3. Formal Problem Definition
- n parties with private parameter tuples where
- Hydraulic constraints:
- Security parameter determining the precision of calculations
- Timeout parameter for protocol completion
5.4. Performance Metrics and Evaluation Criteria
6. Proposed Protocol: Position-Based Commitment Protocol (PBCP)
6.1. Protocol Architecture and Design Principles
6.2. Phase 1: Blind Submission Protocol
| Algorithm 1 Blind Submission Protocol |
|
6.3. Phase 2: Hydraulic Time Calculation
| Algorithm 2 Hydraulic Time Calculation Protocol |
|
6.4. Phase 3: Cyclic Verification Protocol
| Algorithm 3 Cyclic Verification Protocol |
|
6.5. Protocol Extensions and Optimizations
7. Comprehensive Security Analysis
7.1. Formal Security Model and Definitions
7.2. Privacy Analysis Through Hydraulic Equations
- 2 fundamental unknowns: and
- 1 constraint relationship between them
- Cannot separate from without additional information
7.3. Attack Complexity Analysis
7.4. Collusion Attack Analysis
7.5. Verification Integrity Analysis
7.6. Machine Compromise Analysis
8. Performance Analysis and Complexity Evaluation
8.1. Computational Complexity Analysis
8.2. Communication Complexity Analysis
9. Applications and Real-World Use Cases
9.1. Supply Chain Verification and Traceability
- : Product quantities, batch sizes, or authentication codes
- : Processing capacity, quality metrics, or resource density
- : Processing delays, quality assurance time, or regulatory compliance periods
- : Throughput rates, transfer capabilities, or logistical capacity
9.2. Multi-Authority Consensus and Decision Making
- : Authorization codes, vote weights, or decision impact factors
- : Confidence levels, resource commitments, or expertise weights
- : Response time requirements, deliberation periods, or constraint factors
- : Communication capacity, urgency factors, or implementation capability
9.3. Internet of Things (IoT) Authentication Networks
- : Device capabilities, sensor readings, or authentication tokens
- : Computational capacity, memory resources, or processing power
- : Network latency, response time constraints, or energy limitations
- : Communication bandwidth, data transmission rates, or network connectivity
9.4. Financial Services and Privacy-Preserving Transactions
- : Transaction volumes, asset holdings, or capital requirements
- : Risk assessment metrics, credit ratings, or liquidity measures
- : Settlement periods, regulatory approval times, or processing delays
- : Transaction processing capacity, market access rates, or operational efficiency
9.5. Healthcare Data Sharing and Privacy Protection
- : Patient counts, treatment volumes, or outcome metrics
- : Treatment efficacy rates, resource utilization, or quality measures
- : Treatment duration, recovery periods, or processing times
- : Patient throughput, treatment capacity, or research capability
10. Future Work and Protocol Extensions
10.1. Distributed Trust and Fault Tolerance Enhancement
10.2. Advanced Cryptographic Integration
10.3. Dynamic and Adaptive Protocol Variants
10.4. Cross-Domain Applications
11. Conclusion
Author Contributions
Funding
References
- C. Wang, D. Wang, G. Xu, and Y. Guo, “A lightweight password-based authentication protocol using smart card,” Information Sciences, vol. 520, pp. 295–310, 2020. [CrossRef]
- Z. Chen, Y. Jiang, X. Song, and L. Chen, “A survey on zero-knowledge authentication for Internet of Things,” Computer Networks, vol. 195, p. 108234, 2021. [CrossRef]
- O. Goldreich, Secure Multi-Party Computation. Cambridge University Press, 1998.
- P. Zhang and M. A. Schmidt, “Blockchain applications and challenges in the Internet of Things,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9482–9504, 2020. [CrossRef]
- C. Hazay and Y. Lindell, Efficient Secure Two-Party Protocols. Springer, 2010.
- M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Privacy-preserving data aggregation scheme against internal attackers in smart grid,” IEEE Transactions on Smart Grid, vol. 11, no. 2, pp. 666–675, 2020. [CrossRef]
- A. Miller, Y. Xia, K. Croman, E. Shi, and D. Song, “The honey badger of BFT protocols,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 31–42, 2016.
- T. P. Pedersen, “Non-interactive and information-theoretic secure verifiable secret sharing,” in CRYPTO 1991, LNCS 576, pp. 129–140, 1991.
- A. Kate, G. M. Zaverucha, and I. Goldberg, “Constant-size commitments to polynomials and their applications,” in ASIACRYPT 2010, LNCS 6477, pp. 177–194, 2010.
- E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in IEEE Symposium on Security and Privacy, pp. 459–474, 2014. [CrossRef]
- J. Groth, “On the size of pairing-based non-interactive arguments,” in EUROCRYPT 2016, LNCS 9666, pp. 305–326, 2016.
- L. Lamport, R. Shostak, and M. Pease, “The Byzantine generals problem,” ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401, 1982.
- M. Castro and B. Liskov, “Practical Byzantine fault tolerance,” in OSDI 1999, pp. 173–186, 1999.
- E. Ben-Sasson, S. Bentov, Y. Horesh, and M. Riabzev, “Scalable zero knowledge with no trusted setup,” in CRYPTO 2019, LNCS 11694, pp. 701–732, 2019.
- P. Mohassel and P. Rindal, “ABY3: A mixed protocol framework for machine learning,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 35–52, 2018.
- R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, “Secure distributed key generation for discrete-log based cryptosystems,” Journal of Cryptology, vol. 20, no. 1, pp. 51–83, 2007. [CrossRef]
- A. Boldyreva, “Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme,” in PKC 2003, LNCS 2567, pp. 31–46, 2003.
- S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Technical Report, 2008.
- A. Kiayias, A. Russell, B. David, and R. Oliynykov, “Ouroboros: A provably secure proof-of-stake blockchain protocol,” in CRYPTO 2017, LNCS 10401, pp. 357–388, 2017. [CrossRef]
- R. C. Merkle, “A digital signature based on a conventional encryption function,” in CRYPTO 1987, LNCS 293, pp. 369–378, 1987.
- O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game,” in STOC 1987, pp. 218–229, 1987.
- A. C. Yao, “How to generate and exchange secrets,” in FOCS 1986, pp. 162–167, 1986.
- A. Shamir, “How to share a secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, 1979.
- M. Fischer, N. Lynch, and M. Paterson, “Impossibility of distributed consensus with one faulty process,” Journal of the ACM, vol. 32, no. 2, pp. 374–382, 1985.
- R. Canetti, “Universally composable security: A new paradigm for cryptographic protocols,” in FOCS 2001, pp. 136–145, 2001.
- S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM Journal on Computing, vol. 18, no. 1, pp. 186–208, 1989.
- R. S. Wahby, I. Tzialla, A. Shelat, J. Thaler, and M. Walfish, “Doubly-efficient zkSNARKs without trusted setup,” in IEEE Symposium on Security and Privacy, pp. 926–943, 2018.
- S. Bowe, A. Gabizon, and I. Miers, “Scalable multi-party computation for zk-SNARK parameters in the random beacon model,” IACR Cryptology ePrint Archive, 2017.
- M. Chase, D. Derler, S. Goldfeder, C. Orlandi, S. Ramacher, C. Rechberger, D. Slamanig, and G. Zaverucha, “Post-quantum zero-knowledge and signatures from symmetric-key primitives,” in ACM Conference on Computer and Communications Security, pp. 1825–1842, 2018.
- M. Maller, S. Bowe, M. Kohlweiss, and S. Meiklejohn, “Sonic: Zero-knowledge SNARKs from linear-size universal and updateable structured reference strings,” in ACM Conference on Computer and Communications Security, pp. 2111–2128, 2019.
- F. M. White, Fluid Mechanics, 7th ed. McGraw-Hill, 2011.
- B. R. Munson, T. H. Okiishi, W. W. Huebsch, and A. P. Rothmayer, Fundamentals of Fluid Mechanics, 7th ed. Wiley, 2012.
- J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2nd ed. CRC Press, 2014.
- S. Halevi and S. Micali, “Practical and provably-secure commitment schemes from collision-free hashing,” in CRYPTO 1996, LNCS 1109, pp. 201–215, 1996.
- R. Amin, S. H. Islam, G. P. Biswas, M. K. Khan, L. Leng, and N. Kumar, “Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks,” Computer Networks, vol. 101, pp. 42–62, 2016. [CrossRef]
- P. Kumar and H.-J. Lee, “Security issues in healthcare applications using wireless medical sensor networks: A survey,” Sensors, vol. 12, no. 1, pp. 55–91, 2011. [CrossRef]
- I. Damgård and J. B. Nielsen, “Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor,” in CRYPTO 2002, LNCS 2442, pp. 581–596, 2002. [CrossRef]
- R. Cramer, R. Gennaro, and B. Schoenmakers, “A secure and optimally efficient multi-authority election scheme,” in EUROCRYPT 1997, LNCS 1233, pp. 103–118, 1997.
- M. Naor, B. Pinkas, and R. Sumner, “Privacy preserving auctions and mechanism design,” in Proceedings of the 1st ACM Conference on Electronic Commerce, pp. 129–139, 1999.
- C. Cachin, K. Kursawe, F. Petzold, and V. Shoup, “Secure and efficient asynchronous broadcast protocols,” in CRYPTO 2001, LNCS 2139, pp. 524–541, 2001.
- D. Catalano and D. Fiore, “Vector commitments and their applications,” in PKC 2013, LNCS 7778, pp. 55–72, 2013.
- R. W. F. Lai and G. Malavolta, “Subvector commitments with application to succinct arguments,” in CRYPTO 2019, LNCS 11692, pp. 530–560, 2019.
- D. J. Bernstein, “Batch binary Edwards,” in CRYPTO 2009, LNCS 5677, pp. 317–336, 2009.
- D. Boneh and X. Boyen, “Short signatures without random oracles,” in EUROCRYPT 2004, LNCS 3027, pp. 56–73, 2004.
- R. Cramer, I. Damgård, and J. B. Nielsen, Secure Multiparty Computation and Secret Sharing. Cambridge University Press, 2015.
- D. Demmler, T. Schneider, and M. Zohner, “ABY - A framework for efficient mixed-protocol secure two-party computation,” in NDSS 2015, 2015.
- M. Keller, “MP-SPDZ: A versatile framework for multi-party computation,” in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1575–1590, 2020.
- T. Araki, J. Furukawa, Y. Lindell, A. Nof, and K. Ohara, “High-throughput semi-honest secure three-party computation with an honest majority,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 805–817, 2016.
- S. G. Choi, K.-W. Hwang, J. Katz, T. Malkin, and D. Rubenstein, “Secure multi-party computation of Boolean circuits with applications to privacy in on-line marketplaces,” in CT-RSA 2012, LNCS 7178, pp. 416–432, 2012.
- I. Damgård, V. Pastro, N. Smart, and S. Zakarias, “Multiparty computation from somewhat homomorphic encryption,” in CRYPTO 2012, LNCS 7417, pp. 643–662, 2012.
- P. Feldman, “A practical scheme for non-interactive verifiable secret sharing,” in FOCS 1987, pp. 427–438, 1987.
- D. Dolev and H. R. Strong, “Authenticated algorithms for Byzantine agreement,” SIAM Journal on Computing, vol. 12, no. 4, pp. 656–666, 1983. [CrossRef]
- M. Yin, D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham, “HotStuff: BFT consensus with linearity and responsiveness,” in Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, pp. 347–356, 2019.
- E. Buchman, J. Kwon, and Z. Milosevic, “The latest gossip on BFT consensus,” arXiv preprint arXiv:1807.04938, 2018.
- C. Cachin and J. A. Poritz, “Secure intrusion-tolerant replication on the Internet,” in Proceedings International Conference on Dependable Systems and Networks, pp. 167–176, 2001.
- G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, vol. 151, pp. 1–32, 2014.
- B. David, P. Gaži, A. Kiayias, and A. Russell, “Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain,” in EUROCRYPT 2018, LNCS 10821, pp. 66–98, 2018.
- E. Androulaki et al., “Hyperledger fabric: A distributed operating system for permissioned blockchains,” in Proceedings of the Thirteenth EuroSys Conference, pp. 1–15, 2018.
- D. Schwartz, N. Youngs, and A. Britto, “The ripple protocol consensus algorithm,” Ripple Labs Inc White Paper, vol. 5, no. 8, 2014.
- S. Meiklejohn et al., “A fistful of bitcoins: Characterizing payments among men with no names,” in Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140, 2013.
- N. van Saberhagen, “CryptoNote v 2.0,” 2013.
- E. B. Sasson et al., “Zerocash: Decentralized anonymous payments from bitcoin,” in IEEE Symposium on Security and Privacy, pp. 459–474, 2014.
- K. Toyoda, P. T. Mathiopoulos, I. Sasase, and T. Ohtsuki, “A novel blockchain-based product ownership management system (POMS) for anti-counterfeits in the post supply chain,” IEEE Access, vol. 5, pp. 17465–17477, 2017. [CrossRef]
- F. Tian, “An agri-food supply chain traceability system for China based on RFID & blockchain technology,” in 2016 13th International Conference on Service Systems and Service Management (ICSSSM), pp. 1–6, 2016. [CrossRef]
- P. Zhang and M. A. Schmidt, “ForUs: A blockchain-based approach for eliminating food counterfeiting,” International Journal of Information Management, vol. 49, pp. 13–26, 2019.
- G. Zhao, S. Liu, C. Lopez, H. Lu, S. Elgueta, H. Chen, and B. M. Boshkoska, “Blockchain technology in agri-food value chain management: A synthesis of applications, challenges and future research directions,” Computers in Industry, vol. 109, pp. 83–99, 2019.
- S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, vol. 76, pp. 146–164, 2015. [CrossRef]
- Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and privacy issues in Internet-of-Things,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1250–1258, 2017. [CrossRef]
- A. Bogdanov et al., “PRESENT: An ultra-lightweight block cipher,” in CHES 2007, LNCS 4727, pp. 450–466, 2007.
- J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, “The LED block cipher,” in CHES 2011, LNCS 6917, pp. 326–341, 2011.
- M. Wazid, A. K. Das, N. Kumar, A. V. Vasilakos, and J. J. P. C. Rodrigues, “Design and analysis of secure lightweight remote user authentication and key agreement scheme in internet of drones deployment,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3572–3584, 2018. [CrossRef]
- M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, 2014.
- L. Zhang, S. Tang, and J. Chen, “A lightweight authentication scheme with privacy protection for smart grid communications,” Future Generation Computer Systems, vol. 74, pp. 159–169, 2017.
- M. N. Aman, K. C. Chua, and B. Sikdar, “Mutual authentication in IoT systems using physical unclonable functions,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1327–1340, 2017. [CrossRef]
- P. Zhang, N. White, D. C. Schmidt, G. Lenz, and S. T. Rosenbloom, “FHIRChain: Applying blockchain to securely and scalably share clinical data,” Computational and Structural Biotechnology Journal, vol. 16, pp. 267–278, 2018. [CrossRef]
- R. Pass, L. Seeman, and A. Shelat, “Analysis of the blockchain protocol in asynchronous networks,” in EUROCRYPT 2017, LNCS 10211, pp. 643–673, 2017.
- P. Zhang and D. C. Schmidt, “White paper: FHIR-blockchain integration for drug traceability,” 2019.
| Symbol | Description |
|---|---|
| n | Total number of participating parties |
| Party i where | |
| Secure coordination machine/trusted third party | |
| Original message/weight parameter for party | |
| Position-adjusted weight: | |
| Fluid density parameter for party | |
| Hydraulic delay/resistance parameter for party | |
| Volumetric flow rate parameter for party | |
| Position assignment for party in submission order | |
| Hydraulic transfer time from party to party | |
| Combined hydraulic time for party (cyclic sum) | |
| Valid parameter range: | |
| k | Number of colluding adversarial parties |
| f | Number of Byzantine faulty parties |
| Adversarial coalition of parties | |
| Set of honest parties | |
| Security parameter/negligible probability | |
| Cryptographic security parameter | |
| Protocol timeout parameter | |
| ℓ | Precision bits in time calculations |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).