Cosmic coding and transfer storage (COSMOCATS) for invincible key storage
Scientific Reports volume 13, Article number: 8746 (2023) Cite this article
245 Accesses
1 Altmetric
Metrics details
Thus far, a perfectly secure encryption key storage system doesn't exist. As long as key storage is connected to a network system, there is always a chance that it can be cracked. Even if storage is not continually connected to a network system; it is repeatedly necessary for an individual to access storage to upload and download the data; hence there is always a loophole with every conventional encryption key storage system. By utilizing the penetrative nature of cosmic-ray muons, the COSMOCAT (Cosmic coding and transfer) technique may tackle this problem by eliminating the requirement for any network connection to data storage. COSMOCAT was invented as a post quantum key generation and distribution technique for wireless near field communication. However, in its first stage of development, COSMOCAT relied on standard comparators and Global Positioning System (GPS) or other Global Navigation Satellite Systems (GNSS) for key generation. Temporal jitters of the signals outputted from comparators and frequency fluctuations in GPS-disciplined oscillators degraded the key strength and the efficiency of both the key generation and distribution. New strategies are tested in this paper to improve these factors. As a result, the key strength and the key authenticating rate limit are respectively improved by 4 orders of magnitude and more than 5 orders of magnitude. As a consequence, it has become possible to propose a practical methodology for a new key storage and authentication strategy which has the potential to be an impregnable defense against any kind of cyber/physical attack to data storage. Practical applications of COSMOCATS-based symmetric-key cryptosystems to an electronic digital signing system, communication, and cloud storage are also discussed.
While quantum computing promises unprecedented speed and power for processing data, it also poses new risks to public key encryption. As this technology advances over the next decade, its new capabilities could be exploited to break standard encryption methods that are widely used to protect customer data, complete business transactions, and provide secure communications. New schemes are urgently required to prepare for the transition to post-quantum cryptography so that potentially vulnerable data, algorithms, protocols, and systems can be properly protected.
With all architectural solutions using cryptographic keys stored in cloud storage, there is a limit to the degree of security assurance that the cloud consumer can expect to get; this is due to the fact that the logical and physical organization of the storage resources are entirely under the control of the cloud provider1. In particular, the cloud service client's assets are susceptible to key leakage and key corruptions. Loss of a client's encryption key results in severe security issues2. Potential attackers may have the power to generate a new re-encryption key from stored re-encryption keys3. Even if the keys are protected from cyberattacks, the storage system is still vulnerable since, unless it's physically protected inside an underground safe without an entrance, there is always a possibility that a third person could physically access and steal the storage assets or the storage itself. Therefore, an uncrackable encryption key storage system cannot exist in the conventional sense and thus, several security protocols have been established to minimize data storage security weaknesses4. However, if we could safely send keys (without using any physical route such as Ethernet cables, Wi-Fi, optical fibers, Bluetooth etc.) from an internet connected server to storage facilities that are completely concealed inside an inaccessible underground safe, (totally isolated from the outside environment), then we could realize an invincible data storage system which would be entirely safe from security threats since it would be impossible to conduct either physical or cyber-attacks on this system. Security of the key storage system crucial in the fields of vehicle social networks5, blockchain-based data sharing systems6, multiround transfer learning and modified generative adversarial networks7, and consumer-centric internet of medical things for cyborg applications8.
In the current scheme of smartphone devices, the keys are stored in non-volatile memory (NVM). However, due to their robust electrical nature, these NVMs are susceptible to various physical attacks. In many cases, to protect against physical attacks, protection circuitry and tampering detection mode need to be continually activated; hence a constant power supply is required9. For this reason, one of the most popular areas in recent hardware security research is focusing on replacing an NVM key storage embedded in e.g., smart cards with physically unclonable functions (PUF)10,11,12. PUF realizes hardware-based security mechanisms, and was initially developed by Pappu et al.13. It facilitates tamper detection, encryption and device fingerprinting features that can be used for identification and authentication of the device; thus, PUF ultimately eliminates the need to store the secret keys in the NVM of the devices13,14,15. However, the PUF's response can be altered by the following factors: temperature changes, aging, drift, electromagnetic interactions, and other noise sources; thus, several types of corrections are required16,17,18,19,20,21. Another developmental direction is using Bluetooth technology that enables much simpler acquisition of link keys22. However, it is physically possible for attackers to replace the actual Bluetooth adapter with a malicious adapter to retrieve the stored link keys. If the keys are stored in plain text in the smartphone memory, the attacker can obtain unrestricted access to all Bluetooth services on the targeted smartphone23. As long as the key storage is located at accessible locations, physical attacks cannot be avoided with 100% certainty. On the other hand, since COSMOCAT uses highly penetrative comic-ray muons as key generators, and these muons pass through both detectors located above and below massive materials, these muogenic keys could be generated in two locations at the same time; for example, in an above ground data storage facility and in a non-accessible place such as inside an underground safe or submarine. This strategy would eliminate the need to store secret keys in the accessible aboveground device. Moreover, since the randomness of the arrival time of cosmic-ray muons are not affected by terrestrial environments, there is no drift effect in COSMOCAT, and since the muons used for COSMOCAT is highly energetic, the key generation rate is not strongly affected by variations in ambient temperature and electromagnetic field.
Quantum key distribution (QKD) has been proposed as a guaranteed and secure method to share private keys between the sender and the receiver. However, in 2016, Yuen reviewed the problems associated with QKD security24. Accordingly, a white paper from the National Cyber Security Centre (NCSC), UK, proposed a halt to QKD development25 due to the following concerns regarding QKD:
Security research such as authentication is not incorporated into QKD research
In order to build a network with QKD, it is necessary to set up a relay point which relies on classical physics, so it is not unconditionally secure.
Attack methods that may target QKD devices are also being researched, but such research does not guarantee complete security. An unknown loophole may exist.
Updating QKD equipment requires hardware replacement.
QKD may offer highly secured key distribution in principle, but in practice, it cannot be used for upgrading the security of data storage. From the point of view of practicality, there might be more value in researching an alternative methodology with stronger security potential which can be retrofitted to currently available systems.
COSMOCAT has been invented as a post-quantum key generation and distribution scheme for near field communication under a common key cryptosystem26. In COSMOCAT, cosmic-ray muons are used as a natural resource to generate random numbers. As long as the same specific muons pass through the detectors, by recording the arrival time of those muons and using the timestamps as random data for cryptographic keys, each detector can independently generate the same secret keys without having to exchange the keys to one another. The process is as follows: by recording the muon's arrival times, sequences of true random numbers (TRNs) are obtained. If the sender and receiver are close enough (≤ 10 m) to each other to detect the same muons, then after subtraction of the muon's TOF between the sender and the receiver, identical numerical sequences can be independently taken from data recorded at both of the COSMOCAT sensors located at the sender and the receiver locations. Thus, both the sender and the receiver can hold the same TRN sequences (called cosmokeys) without having to physically exchange the data. The number of digits that can be used for cosmokeys depends on precision of measuring the moment the cosmic muons are detected.
Pseudo random number generators are cost-effective, but if the algorithm that generates the numbers is stolen by hackers, keys can be easily decrypted if attackers can correctly predict future number sequences. COSMOCAT essentially realizes a method to obtain a one-time pad which is independently known by only the sender and the receiver and which cannot be cracked; thus, COSMOCAT qualifies as an information-theoretic security technique. Nevertheless, in its first iteration, COSMOCAT was using GPS-disciplined oscillators (GPS-DO) for time synchronization to generate keys for encoding. GPS and other GNSS have enabled widespread adoption of Positioning, Navigation, and Timing (PNT) services in many applications across modern society. Comparators are used for binalizing the muon signals and GPS/GNSS systems are used for synchronizing the detectors of these individuals. However, the following drawbacks exist when using the regular comparators and a GPS-based timing system:
Regular comparators have relatively large temporal jitters in the binalizing timing of the detector's output signals.
GPS-DOs are usually steered to the GPS time every few minutes, thus the resultant frequency output is strongly influenced by frequency fluctuations of local oscillators. These fluctuations degrade the performance of COSMOCAT.
GPS signals are unavailable in underground environments.
Since GPS signals are low-power and unencrypted, there is a vulnerability to interference, jamming, and spoofing. While interference arises from unintentionally produced RF waveforms that raise the effective noise in the receiver processing, jamming is caused by intentionally producing these RF waveforms. Spoofing is caused by unintentional, intentional or malicious activities which generate RF waveforms that mimic true signals to cause a range of effects: from incorrect PNT outputs to receiver malfunction. Therefore, GPS-dependent disruption or interference with PNT systems has the potential (as it was used in its first iteration) to have adverse impacts on the otherwise excellent security of COSMOCAT.
There are several techniques which could be employed to better enhance the independency and the accuracy of timing used in COSMOCAT. These techniques include (1) direct universal time coordinate (UTC) dissemination e.g., via optical fibers, (2) atomic clocks, and (3) cosmic time calibration (CTC)27. All of these techniques offer timing precision of a few ns or better, however they are either (1) costly or (2) have a tendency to drift after being used for long periods of time. Amongst all of these techniques, the cheapest and the most stable solution is CTC. For the second iteration of COSMOCAT described in this work, (A) we replaced the comparator used in the prior work with the constant fraction discriminator (CFD) and improved the key strength and key generation efficiency by 4 orders of magnitude and more than 5 orders of magnitude, respectively. (B) Based on this key generation efficiency, an unbreakable underground key storage security system was designed using a combination of COSMOCAT and CTC by employing one of the major features of COSMOCAT: the penetrative nature of muons (which can automatically generate cosmokeys) which can reach locations deep underground. (C) A protocol for authentication of the encrypted data with the keys stored in the storage in the underground safe is proposed with an introduction on how this could be applied to a digital signing system in cryptocurrency operations. In the current work, a drastic reduction of this timing uncertainty was attempted by introducing a constant fraction discriminator (CFD) and RG-50 co-axial cables instead of the regular comparator and GPS/GNSS systems used in the previous version of COSMOCAT.
In this section, the basic principles of COSMOCATS along with two key results (1. improvements in key strength and key generation and 2. distribution efficiency) will be outlined. Then the newly created COSMOCATS (the procedures followed at the sender's side and the storage side) will be discussed in more detail in the next section.
COSMOCAT has two features. (1) COSMOCAT can duplicate and triplicate numerical sequences of TRNs in different locations. If someone tries to duplicate a 24-digit TRN numerical sequence in different locations with the world's best random number generating machine (generating 250 trillion random numbers per second)28 but without data transfer, it would take 3000 years to accidently generate the same combination of the numbers. On the other hand, since the cosmic ray muon's travelling speed (~ c) and the traveling path (straight) are well known, COSMOCAT can generate 2 or more identical 24-digit TRNs in different locations within one second without physically transferring the TRNs. It is known that cosmic ray muons have a random arrival time distribution: one event occurs completely independently from the occurrence of another event. Ahlen et al.29 evaluated 407,420 high-energy muon arrival times, and found that there were no indications of deviations or time anisotropies in nanosecond to second time scales. (2) COSMOCAT can deliver the same numerical sequences of TRNs between the aboveground facility and a concealed underground vault. Cosmic-ray muons are penetrative, and they have been applied to imaging gigantic objects such as volcanoes30, ocean31, cyclones32, tectonics33, earthquake retrodiction34, Egyptian pyramids35, the Great Wall of China36 as well as underground/underwater positioning37 and navigation38, and precise time synchronization39.
The COSMOCATS system consists of the sender's COSMOCAT sensor, the receiver's COSMOCAT sensor, and the receiver's storage. In the COSMOCATS scheme, (1) if the sender knows the receiver at the storage site will detect the same muons, (2) if the sender knows the distance between the sender and the receiver, and (3) if the time is accurately synchronized between the sender and the receiver, then the sender can predict the muon's arrival time at the receiver's detector. Cosmokeys are defined as timestamps generated by the muons passing through both the sender's sensor and the receiver's sensor. In COSMOCATS, these timestamps (in units of ps) are used as cosmokeys. The muon's arrival timestamp (t) can be described by using a numerical sequence (Ni) as follows:
where N can have a value from 0 to 9. The numerical sequence Ni is used as a cosmokey. When a muon event is observed, (at either the sender's COSMOCAT sensor or the receiver's COSMOCAT sensor) timestamps are automatically issued respectively at the sender and the receiver locations. However, in general, many of these timestamps do not match between the sender and the receiver since many of the muons do not pass though both of the sensors. The cosmokey generation rate can be calculated from the frequency of the muons which pass through both the sender's sensor and the receiver's sensor (fμ):
where S is the effective detection areas of COSMOCAT sensor and Φ is the flux of the muons detected both by the sender's COSMOCAT sensor and the receiver's COSMOCAT sensor. The cosmokey generation rate is:
where I is the intensity of the muons arriving from the zenith angle θ0, and D is the distance between the sender's sensor and the receiver's sensor. In the prior work, single cosmokeys were used as encryption keys. However, in order to attain sufficiently strong keys, it would be better to combine several cosmokeys to generate longer encryption keys. In the following part of this section, the methodology to connect cosmokeys is discussed. The timestamps are recorded in the receiver's sensor at the detector's single counting rate (f0) and are eventually transferred and stored in storage also at this rate. Then, a square of the ratio:
can be defined as the cosmokey matching rate between the sender and the receiver. Due to temporal jitters of the signals outputted from comparators and frequency fluctuations in clocks used in COSMOCAT, generated cosmokeys do not always match between the sender and the receiver. Therefore, the factor (rCK) coming from this effect needs to be considered, also. Consequently, the actual cosmokey matching rate is:
Due to fluctuations in time measurements, the length of each cosmokey ranges from four to six digits. TRN sequences with 15 digits to 40 digits are required in order to generate sufficiently strong encryption keys (48 bit to 128 bit). For this purpose, several cosmokeys should be combined. Therefore, the actual keys used for encrypting data would be a numerical sequence of cosmokeys: {t1, t2, …tn}. However, the keys combined at the sender's detector and the keys combined at the storage detector generally don't match since RCK < f0. Therefore, the storage user (sender) needs to encode the data for NTRIAL times, where NTRIAL is the number of trials required to independently generate the same encryption key between the sender and the receiver, and given by NSENDER x NRECEIVER, where:
and where n is the number of combinations of the generated cosmokeys required to generate encryption keys. Here it was assumed that S is the same for the sender and the receiver. In other words, one key out of NTRIAL keys can be used as an encryption key. For example, if G2 is 0.2, and n = 3, then the sender and the receiver would respectively need to encode the data around 5 × 102 times so that one out of ~ 2 × 105 trials would match the key generated in the storage.
A more detailed procedure will be described in the following section by introducing an example case, but the basic concept of encoding, key storing, and authentication will be outlined here for the purpose of explaining the experimental results. The procedures the storage user needs to follow are:
Encode the data for Ntrial times with the timestamps (Ni (t0)) generated at t = t0. The encoding rate is f0−1.
Every time the key is used for encoding, this key is erased.
Meanwhile, in the storage facility,
Other timestamps are generated at a rate of f0−1.
The authentication procedure for the storage user is as follows:
Send a set of Ntrial encoded data to the storage facility.
As was described, if we can improve the timing accuracy, we can reduce n; hence we can drastically reduce Ntrial. Consequently, the key generation rate in storage could be drastically upgraded. Since the comic muon flux cannot be changed, G2 can be increased by improving a geometrical configuration and detection efficiency of the COSMOCAT system.
During the current timing measurements, naturally occurring cosmic-ray muon events are detected. In order to confirm the performance of the key generation with CFD, the muon's time of flight (TOF) was measured for different distances. The current experimental setup consists of three plastic scintillators (ELJEN 200), three photomultiplier tubes (PMTs: HAMAMATSU R7724), three high voltage power supplies (0–2000 V), three CFDs (KAIZU KN381), time to digital converters (TDC: ScioSence TDC-GPX), and a field programmable gate array (FPGA: Intel MAX 10). Scintillation photons are generated in the plastic scintillator and then travel through an acrylic light guide to be processed by the photomultiplier tube. The PMT signals are transferred to CFDs via RG 50 co-axial cables. These PMT signal pulses were discriminated by CFDs in order to reduce the temporal jitter with this process, and were converted to NIM level pulses. These NIM level signals were transferred to TDCs. All of the electronics were powered by 100-Vac commercial electricity.
Three scintillation detectors (Detector A, Detector B and Detector C) were placed vertically to track vertical muons. Since muons arrive only from the upper hemisphere, with this detector configuration, the muons always pass through Detector A first, Detector B second, and Detector C third. The discriminated signals from Detector A were fed to the TDC as the start signal, and coincidence signals of those from Detector B and Detector C were fed to the TDC as the stop signal via RG-50 co-axial cables to avoid any problems associated with the frequency fluctuations of the local clock. A firmware written in FPGA processes the TDC data and outputs the hexadecimal timing data. Since the time resolution of this TDC is 27.4348 ps, the backend software convert these data to decimal data and multiply 27.4348 ps to derive the TDC time spectrum.
The value of high voltage applied to these PMTs was 1500 V. Two different spatial intervals (D = 120 cm and D = 240 cm) between Detector A and Detector C were tested, and in this interval, a lead block with a thickness of 18 cm (equivalent to a concrete slab with a thickness of 1 m) was inserted for demonstration. The spatial interval between Detector B and Detector C was fixed to be 3 cm. In order to reduce the accidental coincidence rate, only triple coincidence events between Detectors A, B, and C were considered in this work. The coincidence time window was set to be 100 ns. Considering the current detector's single count rate (~ 4 Hz), the accidental rate will be reduced to 10–12 Hz which is negligible for the current purpose.
The size of the scintillators used in the current work was 20 × 20 cm2 with a thickness of 2 cm. The solid angles formed by Detector A and Detector C were respectively 28 msr and 7 msr for D = 120 cm and D = 240 cm. Travel distances of the photons in the scintillator (λi) tend to vary as a function of time since the distance between the PMT and the muon's hitting point within the scintillator varies for each event. Therefore, the maximum time and the minimum time between the moment when the scintillation photons arrive at the sender's photocathode and the moment when the scintillation photons arrive at the receiver's photocathode are respectively:
where cν is the speed of light in material with a refractive index of ν (cν = c/1.49 for a plastic scintillator). If we employ the parameters used for the prior work (W = 1 m and D = 70 cm), the values for [D(τ)c−1 + λ(τ)cν−1]MAX and [D(τ)c−1 + λ(τ)cν−1]MIN are respectively ~ 12.2 ns and ~ 2.3 ns; hence, in the previous geometrical configuration, there was an uncertainty of timing of ~ 10 ns at the most. On the contrary, the setup employed in the current work (W = 20 cm and D = 120 cm and 240 cm) reduces this uncertainty to, at most, a value of ~ 1 ns. The block diagram designed for the current experiment is shown in Fig. 1.
Block diagram of the experimental setup for the COSMOCATS timing evaluation. PMT, HV, CFD, TDC, CPLD and Pb respectively stands for a photomultiplier tube, a high voltage supply, a constant fraction discriminator, a time to digital converter, a complex programmable logic device, and a lead plate.
As was described in the "Principle of COSMOCATS" subsection, the accuracy of the time recorded by the detector determines the number of timestamps we need to use to generate encryption keys. In this subsection, a detailed analysis results and how the proposed algorithm works are described in a step by step manner, and the significance of the improvements is shown.
First, the TDC time spectra were generated to compare the muon's TOF for different spatial intervals between Detector A and Detector C (D = 120 cm and D = 240 cm). The distribution of the time displacements (tRECEIVER − tSENDER) observed Detector A and Detector C are shown in these TDC spectra. The time required for muons to travel 120 cm and 240 cm are respectively 4 ns and 8 ns.
Next, the shapes of these 2 TDC time spectra were examined. As a result, the shapes of both of these TDC spectra showed almost identical unimodal Gaussian-like shapes (Fig. 2). The standard deviation of these spectra was calculated to derive the timing accuracy. The values were 4.2 ± 0.9 ns and 8.4 ± 0.9 ns for D = 120 cm and D = 240 cm, respectively.
The currently obtained TDC spectra were compared with those measured in the prior work. There, the spatial interval between Detector A and Detector B was 70 cm. There are two major differences between the current work and the prior work. (1) The peaks measured in the prior work are much broader than the peaks we measured in the current work. This broadness comes from the jitter of the comparators used in the prior work. (2) While the time required for muons to travel 70 cm was 2.3 ns, there were three peaks at ~ 2 ns, ~ 20 ns, and ~ 45 ns where the 20-ns peak was largest, and the other two peaks were much smaller than this peak (Fig. 2A inset). This large offset was due to the short-time scale drift effect of the GPS-DO.
Comparison of the time of flight distribution between the prior work and the current work. The time spectrum as obtained in the prior work is indicated with blue filled circles. The time spectra as obtained in the current work for a distance of 120 cm (green circle) and 240 cm (orange circle) are overlaid (A). The magnified view in the temporal region between 0 and 20 ns is shown (B). The error bars are within the circles. The data of the prior work were taken from Tanaka26.
As a consequence, the accuracy of timing muon arrivals was improved by two orders of magnitude (from ~ 100 to ~ 1 ns). In conclusion, it was confirmed that there were significant improvements in timing in terms of offset and precision of timing muon arrivals. Therefore, the algorithm proposed in the "Principle of COSMOCATS" subsection works more efficiently for the following reasons.
In the prior work, as a consequence of discrepancies in TOF, the time series of N3≤i≤6 (4 digits) were used as cosmokeys. In the current work, the time series of N3≤i≤8 (6 digits) can be used as cosmic keys.
In order to generate encryption keys with 24 digits (128 bit), with 4-digit cosmokeys and 6-digit cosmokeys, Ntrial would be respectively 593,775 and 4845 for a given G2 = 0.2 with the prior and current COSMOCAT system. Therefore, encryption key generation rate is increased by more than 2 orders of magnitude.
As shown in Eq. (6), the encryption key strength and the encryption key generation rate are in the tradeoff relationship. For example, 24 decimal digit keys (n = 4 for 6-digit cosmokeys) are 104 times stronger than 20 decimal digit keys (n = 5 for 4-digit cosmokeys). (B) could be rephrased that the current setup can generate stronger keys than the prior setup in a unit time.
fμ values observed for these distances (120 cm, and 240 cm) were respectively ~ 0.1 Hz and ~ 0.02 Hz. Since the value of G2 depends on the broadness of the TOF spectrum, Ntrial can be further improved and will be discussed in the following paragraph.
RCK can be derived by integrating the time spectrum (blue filled circles) shown in Fig. 2 over the time range between 0 and the given time window (TW) such that:
where f(t′) is the event frequency at t′. The value of Eq. (9) for TW = 100 ns was 20 m−2 sr−1 s−1 in the prior work. Figure 3A shows rCKRCK as a function of TW (120 cm and 180 cm) measured in the current work. There was no large distant-dependent difference in rCKRCK. For TW = 1 ns, rCK = 0.58 for 120 cm and rCK = 0.49 for 240 cm; for TW = 3 ns, rCK = 0.87 for 120 cm and rCK = 0.77 for 240 cm. Figure 3B shows G2 as a function of Ω for different TW. Consequently, Ntrial could be drastically reduced. For example, if we compare Ntrial for the same geometrical configuration with the prior work (Ω ~ 1sr), the Ntrial values required for the sender to share encryption keys in the storage with digits of 20 digits in the prior work and 24 digits in the current work are respectively 53,130 and 70.
Cosmokey generation rate as a function of the time window. The data points are shown with blue (D = 120 cm) and orange (D = 240 cm) filled circles (A). The actual cosmokey matching rate is also shown as a function of the solid angle formed by the sender's sensor and the receiver's sensor for different time windows (B).
The key generation rate increases as a function of the detector size. However, as shown in Eqs. (7) and (8), the key strength is reduced due to uncertainties coming from the detector size. In order to solve this problem, it is necessary to modularize the detector within the unit size that mustn't exceed the given allowance of timing uncertainty, and to increase the number of modules. Since the tracking rate is reduced as a function of the distance as shown in Eq. (3), the key generation rate is limited not only by the size of the detectors but also by the distance between detectors.
COSMOCAT doesn't include any critical device for safety requirements. Plastic scintillators are non-inflammable. The electric current generated by the high voltage power supply is measured in the sub-milliamps scale. While in the current experimental setup, all of the detectors and electronics are wired. This limits potential availability of COSMOCATS since for example, the underground safe or submarine and the aboveground device must be wired. However, a non-wired alternative solution using cosmic time calibrator (CTC) will be discussed later in this section.
As was mentioned in the previous section, since cosmic-ray muons are highly energetic, the key generation rate is not strongly affected by variations in ambient temperature and electromagnetic field. However, the muon rate is reduced in the underground/underwater environments. For example, it is reduced by 99% at 100 m and by 99.999% at 1000 m40. Therefore, the key generation rate is significantly reduced in deep underground/underwater environments.
If eavesdroppers were to setup an additional detector above or underneath COSMOCATS, and if they know the time-zero moment defined by COSMOCATS, they will be able to steal keys. However, this risk can be mitigated by frequently changing the time-zero values. Since these values are used only for time synchronization, these values don't have to be known by users and thus, security of these values is somewhat guaranteed.
As was described in the previous section, in order to authenticate the sender's data with the key stored in storage, the storage user needs to send a set of Ntrial encoded data to the key storage facility. In the key storage facility, the Ntrial encoded data will be authenticated by verifying the Nstorage timestamps. If the detector size of the sender's COSMOCAT sensor and that of the receiver's COSMOCAT sensor are the same, and if the data encryption at the sender and the key generation at storage are conducted in the same time period, Nstorage = Ntrial. In the prior work, 53,130 × 20 digits = 1,062,600 patterns in the encoded data need to be verified (to find a match) with the 1,062,600 patterns of the keys stored in storage. The time required to verify 1012 patterns is 25 s, and thus the authentication rate limit would be 0.04 per second with a currently commercially available graphic card: Gigabyte GeForce RTX 2080 Ti Turbo 11 GB Graphics Card41. However, if we use Ntrial, a value achieved by the current work, the number of patterns we would need to verify would only be 3 × 106 patterns for 24 digit keys; hence the authentication rate limit would reach a rate of 12,000 per second. This is an improvement by more than 5 orders of magnitude.
Degradation of the cosmokey length due to temporal jitters of the signals outputted from comparators was solved. In order to replace GPS with another device, we need an alternative wireless ns-level time synchronization scheme. However, the currently available wireless time synchronization technique is RF-based and offers only a microsecond-order time synchronization precision42,43. Not only does RF fall short of the precision requirements of COSMOCAT, but also RF cannot penetrate matter sufficiently to reach the underground safe location.
Recently, the cosmic time synchronizer (CTS) was developed39 as a wireless underground/underwater time synchronization technique, but the time synchronization precision was limited to ~ 100 ns. The easiest way to synchronize the sender's clock and the receiver's clock at the storage site is by wiring these clocks. However, if this strategy was used for COSMOCATS, the remaining physical traffic between the sender and the storage may reduce the security level of the system. Therefore, it is better to keep the storage physically separated at a distance at least while encoding files on the server and generating encryption keys in the storage. Therefore, the cosmic time calibrator (CTC) scheme is employed in this work.
Figure 4 shows a diagram of the setup for the CTC-based COSMOCATS system. In this system, COSMOCATS timestamps are issued by local oscillators called OCXOs (oven controlled crystal oscillators). Since the frequency of OCXO outputs drifts in a different way between the sender's OCXO and the receiver's OCXO, the timestamps issued by the same muons could be recorded as different timestamps between the sender's OCXO and the receiver's OCXO. However, in this system, this difference is retrospectively corrected with another pair of muon sensors that are prepared in the vicinity of the COSMOCATS system.
Block diagram of the CTC-based COSMOCATS system. The notation in this diagram is the same as the one used in Fig. 1. The blue and green arrows indicate the different muons.
CTC uses cosmic ray muons as calibration signals to correct local clocks associated with COSMOCAT sensors. If the sender's local clock is defined as the standard clock (labeled as Clock 0) then its successive clock is named here as Clock 1. The times measured by Clock 0 and Clock 1 are respectively labeled with τ and t. Since most of a cosmic-ray muon's Lorentz factor is much larger than 1, it is reasonable for us to approximate the time (T) required for cosmic-ray muons to travel a distance between Detector 0 and Detector 1 to be Dc−1. Consequently, if a cosmic-ray muon passes through Detector 0 and Detector 1, then the moment when the muon has passed through Detector 1 is measured by Clock 1 (t) as:
δτ comes from the relative drift of Clock 1 measured with Clock 0. Since D is known, δτ can be derived from t and τ. The information of τ can be associated with the data when the sender encodes the data with the COSMOCAT system, and can be sent to the storage receiver when the senders authenticate their encrypted data. The muon rate is limited, and the OCXO doesn't drift so far within a short period of time (Fig. 5A). In order to remove effects from the comparators/geometrical configuration of the setup, signals from a clock generator (Technoland N-TM 715) split with a fan-out circuit (Technoland N-TM 605) instead of signals from the scintillation detectors were fed into TDC shown in Fig. 4. In Fig. 5B, a standard deviation calculated from 9 independent runs of OCXO is shown as a function of time. If the CTC steering frequency is < 0.1 Hz, > 99.7% of the time stamps can be corrected by finding coincident events within a time window of tW = 10 ns for the muon that passed through Detector 0 and Detector 1. Figure 5C shows a magnified view of temporal fluctuations acquired in another OCXO run within the time rage between 0 and 5 s with a sampling rate of 10 Hz (the data shown in Fig. 5A,B are sampled at 1 Hz). In this specific case, a standard deviation within this time range was 349 ps, indicating that CTC would work satisfactory for the COSMOCATS system.
Temporal fluctuations in CTC with OCXO. Fluctuations for 9 independent runs are shown as a function of time (A). A standard deviation calculated from 9 independent runs is shown as a function of time (B). A magnified view of 10th run within the time range between 0 and 5 s is also shown (C).
The clock correction errors due to the accidental coincidence can be neglected. As can be seen in Eq. (11), the time window set for finding coincidence events is generally much shorter than the open-sky muon's arrival rate (f0−1):
Therefore, the accidental coincidence is negligible if we use four CTC sensors, and if we look for fourfold coincidence events such that:
where T is the accidental coincidence interval. For example, if tW = 10–8 s, and f0 = 102 Hz, the accidental coincidence would occur every 2.5 × 1015 s. The following procedure describes the CTC process: (A) TTL pulses outputted from OCXO are continuously counted by the scaler respectively at Detector 0 and Detector 1. These count numbers are respectively defined as N0 and N1. (B) Once τ information (N0) is sent to Clock 1, Dc−1+ δτ is calculated from Eq. (11), and it is then subtracted from t (N1). By repeating this process, Clock 0 and Clock 1 can be resynchronized in a retrospective way with a precision of < < 10 ns as is indicated in Fig. 5B,C. The correction time intervals are equivalent to the key generation time intervals and the authenticating time intervals that are generally much shorter than 5 s.
The caveat of the COSMOCATS system is that the storage is invincible only when files are being encoded on the user's server and encryption keys are being generated in storage. However, there are several useful applications of this storage system which can be used to generate an electronic digital signature. The electronic digital signature system is an essential concept in modern society: integral to cryptocurrency, e-commerce websites, social media, banking apps and any other exchange of sensitive data. Here we consider a model of cryptocurrency using COSMOCAT and issued by a fictitious organization called COSMOBANK as an example. In this scenario, storage is located inside the underground safe of this bank. This underground safe is built in the COSMOBANK building and there is no entrance; hence no human can access the underground safe. Therefore, this safe is physically protected. The cryptocurrency called cosmocurrency is issued by COSMOBANK. Cosmocurrency functions like cash and encrypts the data showing its value (10 USD, 100 USD, etc.) with the COSMOCATS system equipped for COSMOBANK. The key used for encrypting each cosmocurrency is used as an identification number for each cosmocurrency "bill".
The procedure to issue the cosmocurrency is as follows. The aboveground COSMOCAT sensor encrypts the cosmocurrency data and the encrypted cosmocurrency is transferred to the COSMOBANK server that is connected to the internet. At the same time, the underground COSMOCAT sensor located inside the safe records the timestamps and transfers them to storage. CTC is used for recording the time calibration information which is later used for the authentication process. Neither physical nor cyber connections exist between the aboveground server sensor to storage. Therefore, at this stage, the identification numbers (24-digit encryption keys) of the cosmocurrency cannot be leaked. Also, since cosmocurrency is strongly encrypted in this process, any spying third party that managed to access the cosmocurrency data (protected by 24-digit keys) doesn't have a possibility of tampering with the cosmocurrency. (It would take approximately one million years to crack with a computer using a currently commercially available graphic card: Gigabyte GeForce RTX 2080 Ti Turbo 11 GB Graphics Card41).
The authenticating process would be required when a transaction is performed with cosmocurrency. At this stage, there are physical connections between the COSMOBANK server and the underground storage. The physical connection for uploading from the COSMOBANK server to the underground storage is one way. The device that can be used for this purpose is e.g., a USB-based DataBridge44. A DataBridge is a security device that connects terminals with a USB cable and allows one-way data transfer only while the terminals are connected. Therefore, it is impossible to download the keys from the storage on the server's side. Even if the data bridge itself is cracked, the data on this traffic is already highly encrypted. The physical connection for downloading data from this storage is an RG50 coaxial cable. If the data are successfully authenticated by the key in the storage, (A) the key in this storage is erased, and (B) a TTL pulse is outputted to the COSMOBANK server. After this authentication process, COSMOBANK will know the corresponding cosmocurrency is the authentic currency.
This authenticating process guarantees the security of cosmocurrency for the following reasons: (A) the cosmocurrency users cannot duplicate this currency since the same cosmocurrency used for the second transaction cannot be authenticated, and (B) eavesdroppers would get no useful data since information related to encryption keys is not included in this TTL pulse. The cosmocurrency issuing and authenticating processes are summarized in the diagram shown in Fig. 6. The aforementioned protocol indicates that once the encrypted data like cosmocurrency are generated, these can be used not only for virtual currency but also for other electronic digital signing processes on other occasions for other purposes.
Scheme of COSMOCATS-based key generation and authentication. The cosmocurrency issuing (A) and authenticating (B) processes are shown. In this scheme, a data storage is located inside an underground safe. Blue and green boxes respectively indicate the COSMOCAT sensors and CTC detectors. Blue and green arrows indicate muons from different origin. Each cosmocurrency (box with a coin, lock and numbers) contains the information about its value to be decrypted by each key assigned to each cosmocurrency (box with a key and numbers). Red and black arrows respectively indicate the one-way traffic through a USB-based data bridge and an RG50 coaxial cable.
The majority of other cryptocurrency uses digital signatures and cryptocurrency mining to store data on a public ledger that cannot be altered retroactively without altering all subsequent blocks: blockchains that use the hashing algorithm. As security and privacy of a blockchain solely depends on the hashing and digital signatures, a number of researchers45,46,47,48,49,50,51 have discussed about how the fast progress of quantum computing has opened up the possibilities of attacks on blockchains through Grover's and Shor's algorithms. ECDSA is mainly used as a way to sign digitally. It uses the logarithmic problem for security which cannot be solved by classical computers, making it secure for now, but this security will be compromised with the advancement of quantum computing. Moreover, the most criticized issue of this system is excessive energy consumption52. There is a report that the amount of energy consumed by bitcoin mining exceeds the total electricity consumed in dozens of countries53. It is clear that the mining process will have various environmental consequences due to the excessive amount of energy consumption required. By following the aforementioned COSMOCAT-based protocol, not only would energy requirements be reduced, but also the safety of issuing currency and transactions will be guaranteed and thus, centralized cash management will be possible. As a result, the standard public ledger distributed within a peer-to-peer computer network can be discarded; hence the mining process can be removed from cryptocurrency.
Rapid growth of future secure wireless communications to various vehicles are expected. The communication target ranges from unmanned aerial vehicles (UAVs)54 to autonomous underwater vehicle (AUV) and submarines55. The COSMOCATS system has the capability to establish highly secured wireless communication between land-based users and these vehicles. The process would be as follows: before a UAV, AUV or submarine departs from an airport or seaport, users generate keys both in the user's device and the storage in these vehicles. While keys are generated, the user's device is totally isolated from the network. Therefore, keys exist only in COSMOCATS or in the user's device. Users later could use these keys to encode their data and send them to AUVs/UAVs/submarines with a regular communication methodology (Fig. 7). When these vehicles receive the encrypted data, they are decoded by using keys stored in the storage. Since there are no key exchanges between the users and vehicles from the beginning to the end, the communication contents cannot be eavesdropped. The only caveat would be that users need to be sufficiently close to the vehicles when keys are generated.
Applications of COSMOCATS to secure wireless communications to various vehicles. Encryption keys are generated in both the user's device and the vehicles by utilizing true random numbers (TRN) generated by muons (A). When the users send the messages to these vehicles, the users encode their data with these encryption keys to transfer their messages to the vehicles with the conventional signal transfer techniques such as RF and acoustic techniques, and these messages are decoded by utilizing the encryption keys duplicated in these vehicles (B). The same procedure is applied also when these vehicles send the messages to the users.
Storing data remotely to the cloud in a flexible on-demand manner brings various benefits, but there is a potential risk. A cloud data storage service usually involves the cloud user, the cloud service provider (CSP) and the third-party auditor (TPA). Users rely on the CSP for cloud data storage and maintenance. However, for their own benefits the CSP might neglect to keep the prescribed protocol execution. We assume that the TPA is reliable and independent. However, the TPA could learn the outsourced data after the audit. If, alternatively, the data are all encrypted with COSMOCAT and the keys are stored in COSMOCATS which is located where the TPA cannot physically access, the TPA will not have the opportunity to eavesdrop on the user's data.
The future development of more advanced timing techniques will improve efficiency of key generation and distribution that could further enhance security. Although picosecond-level timing resolution is not easy to achieve in particular with a relatively large detector, several applicable techniques have been reported using Chrenkov radiation. For example, timing resolution of 50 ps and 25 ps have been respectively attained with Belle II Time of Propagation particle identification system56 and Micromegas detectors57. The future research and development studies include investigating the possible high precision timing technologies for the requirements of a COSMOCATS upgrade.
As was discussed in Introduction section, security research (such as authentication) is not incorporated into QKD research, and QKD itself cannot be used to protect data storage. On the other hand, COSMOCAT realizes secured data storage. However, there are spatial limitations on the range of COSMOCATS (e.g., the user must have access right above or right beneath the COSMOCATS), for information transmitted on the network by the users to be totally secured. Therefore, a profitable direction for future research can also include utilizing a hybrid combination of both QKD and COSMOCATS, to make the most of each technique's strengths and to mitigate each technique's weaknesses, in order to upgrade the security and maintenance capabilities of network services.
In conclusion, it was shown that COSMOCAT has the potential to realize invincible key storage that enables ultra-high security electronic digital signing. While the advantage of symmetric-key cryptosystems is that they are invulnerable against quantum computers and that processing is faster than public-key cryptosystems, the disadvantage is that it requires careful handling of keys. This is because no matter how complicated the encryption is, if the key is stolen, anyone can decrypt the data. Since the encryption side and the decryption side must have the same key, the possibility of key leakage increases as the number of holders increases. The COSMOCATS system has solved these problems. The COSMOCATS system takes advantage of the two major and unique features of COSMOCAT: strong penetrability to underground locations and the capability to generate identical multiple TRN sequences at a distance without having to physically transfer these sequences. Consequently, we can construct a new symmetric-key cryptosystem between aboveground locations and concealed underground locations. It is anticipated COSMOCATS will contribute towards the establishment of a new system for postquantum electronic digital signing, including cryptocurrency, that doesn't require blockchains; hence helping ensure unprecedented levels of security for users and cutting energy consumption problems associated with other techniques.
The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request.
National Institute of Standards and Technology, Cryptographic Key Management Issues & Challenges in Cloud Services. Retrieved from https://nvlpubs.nist.gov/nistpubs/ir/2013/nist.ir.7956.pdf (2013).
Prajapati, P. & Shah, P. A. Review on secure data deduplication: Cloud storage security. J. King Saud. Univ. Comput. Inf. Sci. 34, 3996–4007 (2022).
Google Scholar
Lin, H.-Y. & Tzeng, W.-G. A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23, 995–1003 (2012).
Article Google Scholar
Jing, Q. et al. Security of the Internet of Things: Perspectives and challenges. Wireless. Netw. 20, 2481–2501. https://doi.org/10.1007/s11276-014-0761-7 (2014).
Article Google Scholar
Khowaja, S. A. et al. A secure data sharing scheme in community segmented vehicular social networks for 6G. IEEE Trans. Industr. Inform. 19, 890–899 (2022).
Article Google Scholar
Zhang, L. et al. BDSS: Blockchain-based data sharing scheme with fine-grained access control and permission revocation in medical environment. KSII Trans. Internet Inf. Syst. 16, 1634–1652 (2022).
Google Scholar
Chui, K. T. et al. Multiround transfer learning and modified generative adversarial network for lung cancer detection. Int. J. Intell. Syst. 2023, 6376275. https://doi.org/10.1155/2023/6376275 (2023).
Article Google Scholar
Tiwari, P. et al. Consumer-centric internet of medical things for cyborg applications based on federated reinforcement learning. IEEE Trans. Consum. Electron. 99, 1–1 (2023).
Article Google Scholar
Shamsi, K. & Jin, Y. Security of emerging non-volatile memories: Attacks and defenses. Retrieved from https://ieeexplore.ieee.org/document/7477293 (2016).
Microsemi. Microsemi and Intrinsic-ID Deliver Integrated Security Solutions for Government Applications. Retried from http://investor.microsemi.com/releasedetail.cfm?ReleaseID=731250 (2013).
NXP Semiconductors N.V. NXP strengthens SmartMX2 security chips with PUF anti-cloning technology. Retrieved from http://www.nxp.com/news/press-releases/2013/02/nxp-strengthens-smartmx2-security-chips-with-puf-anti-cloning-technology.html (2013).
Sadeghi, A. R. & Naccache, D. Towards Hardware-Intrinsic Security: Foundations and Practice 3–305 (Springer, 2010).
Book MATH Google Scholar
Pappu, R. et al. Physical one-way functions. Science 297, 2026–2030 (2002).
Article ADS CAS PubMed Google Scholar
Fremanteau P. & Naccache D. Unforgeable identification device, identification device reader and method of identification. Retrieved from https://www.google.com/patents/EP0583709B1?cl=en (1999).
Afghah, F. et al. A ReRAM physically unclonable function (ReRAM PUF)-based approach to enhance authentication security in software defined wireless networks. Int. J. Wirel. Inf. Netw. 25, 117–129. https://doi.org/10.1007/s10776-018-0391-6 (2018).
Article Google Scholar
Kang, H. et al. Cryptographie key generation from puf data using efficient fuzzy extractors. Retrieved from https://ieeexplore.ieee.org/document/6778915 (2014).
Kang, H. et al. The implementation of fuzzy extractor is not hard to do: An approach using puf data. Retrieved from https://www.jst.go.jp/crest/dvlsi/list/SCIS2013/pdf/SCIS2013_2E1-5.pdf (2013).
Chen, B. et al. A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes. Retrieved from https://arxiv.org/abs/1701.07320 (2017).
Kang, H. et al. Performance analysis for PUF data using fuzzy extractor. In Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering (eds Jeong, Y. S. et al.) 277–278 (Springer, 2014).
Google Scholar
Delvaux, J. et al. Efficient fuzzy extraction of puf-induced secrets: Theory and applications. Retrieved from https://eprint.iacr.org/2015/854.pdf (2016).
Taniguchi, M. et al. A stable key generation from puf responses with a fuzzy extractor for cryptographic authentications. Retrieved from https://ieeexplore.ieee.org/document/6664910 (2013).
Gehrmann, C. & Persson, J. Bluetooth Security 1–222 (Artech House, 2004).
Google Scholar
Karygiannis, T., & Owens, L. Wireless Network Security 802.11, Bluetooth and Handheld Devices. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf (2002).
Yuen, H. P. Security of quantum key distribution. IEEE Access 4, 724–749 (2016).
Article Google Scholar
National Cyber Security Centre. Quantum security technologies. Retrieved from https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies (2016).
Tanaka, H. K. M. Cosmic coding and transfer for ultra high security near-field communications. iScience 26, 105897 (2023).
Article ADS PubMed PubMed Central Google Scholar
Tanaka, H. K. M. Cosmic Time Calibrator for Wireless Sensor Network. Retrieved from https://assets.researchsquare.com/files/rs-2420301/v1/b508105a-fdef-4c05-9d36-8c4d851cc341.pdf?c=1672873223 (2023).
Kim, K. et al. Massively parallel ultrafast random bit generation with a chip-scale laser. Science 371, 948–952 (2021).
Article ADS CAS PubMed Google Scholar
Ahlen, S. P. et al. Arrival time distributions of very high energy cosmic ray muons in MACRO. Nucl. Phys. B 370, 432–444 (1992).
Article ADS Google Scholar
Tanaka, H. K. M. Particle geophysics. Annu. Rev. Earth. Planet. Sci. 42, 535–549 (2014).
Article ADS CAS Google Scholar
Tanaka, H. K. M. et al. Periodic sea-level oscillation in Tokyo Bay detected with the Tokyo-Bay seafloor hyper-kilometric submarine deep detector (TS-HKMSDD). Sci. Rep. 12, 6097. https://doi.org/10.1038/s41598-022-10078-2 (2022).
Article ADS CAS PubMed PubMed Central Google Scholar
Tanaka, H. K. M. et al. Atmospheric muography for imaging and monitoring tropic cyclones. Sci. Rep. 12, 16710. https://doi.org/10.1038/s41598-022-20039-4 (2022).
Article ADS CAS PubMed PubMed Central Google Scholar
Tanaka, H. K. M. Muographic mapping of the subsurface density structures in Miura, Boso and Izu peninsulas, Japan. Sci. Rep. 5, 8305. https://doi.org/10.1038/srep08305 (2015).
Article ADS CAS PubMed PubMed Central Google Scholar
Tanaka, H. K. M. et al. Muography as a new tool to study the historic earthquakes recorded in ancient burial mounds. Geosci. Instrum. Method Data Syst. 9, 357–364. https://doi.org/10.5194/gi-9-357-2020 (2020).
Article ADS Google Scholar
Morishima, K. et al. Discovery of a big void in Khufu's Pyramid by observation of cosmic-ray muons. Nature 552, 386–390 (2017).
Article ADS CAS PubMed Google Scholar
Liu, G. et al. High-precision muography in archaeogeophysics: A case study on Xi’an defensive walls. J. Appl. Phys. 133, 014901. https://doi.org/10.1063/5.0123337 (2023).
Article ADS CAS Google Scholar
Tanaka, H. K. M. Muometric positioning system (μPS) with cosmic muons as a new underwater and underground positioning technique. Sci. Rep. 10, 18896. https://doi.org/10.1038/s41598-020-75843-7 (2020).
Article ADS CAS PubMed PubMed Central Google Scholar
Tanaka, H. K. M. Wireless muometric navigation system. Sci. Rep. 12, 10114. https://doi.org/10.1038/s41598-022-13280-4 (2022).
Article ADS CAS PubMed PubMed Central Google Scholar
Tanaka, H. K. M. Cosmic time synchronizer (CTS) for wireless and precise time synchronization using extended air showers. Sci. Rep. 12, 7078. https://doi.org/10.1038/s41598-022-11104-z (2022).
Article ADS CAS PubMed PubMed Central Google Scholar
Groom, D. E. et al. Muon stopping-power and range tables: 10 MeV–100 TeV. At. Data Nucl. Data Tables 78, 183–356 (2001).
Article ADS CAS Google Scholar
Response IT. How long does it take to crack your password? Retrieved from https://www.response-it.co.uk/news/2020/9/2/how-long-does-it-take-to-crack-your-password (2022).
Hill, J. & Culler, D. A wireless embedded sensor architecture for system-level optimization. Retrieved from https://people.eecs.berkeley.edu/~culler/cs252-s02/papers/MICA_ARCH.pdf
Cena, G. et al. Implementation and evaluation of the reference broadcast infrastructure synchronization protocol. IEEE Trans. Industr. Inform. 11, 801–811 (2015).
Article Google Scholar
Adachi, H. et al. DataBridge: Technology to Transfer Data Securely and Efficiently Between Terminals Connected to Different Network. Retrieved from https://www.ntt-review.jp/archive/ntttechnical.php?contents=ntr201501ra2.html (2015).
Hiten, M. Threat to the Current Blockchain Cryptosystems Due to the Advancement of Quantum Computers 1–214 (eds Malik L. et al.) (Taylor & Francis, 2022)
Agarwal, A. et al. Quantum computing and its threats to blockchain. J. Anal. Comput. 16, 1–5 (2022).
CAS Google Scholar
Xing, Z. et al. Black bird attack: A vital threat to blockchain technology. Procedia Comput. Sci. 199, 556–563 (2022).
Article Google Scholar
Srivastava, T. et al. Integration of quantum computing and blockchain technology: A cryptographic perspective 1–228 (ed. Kumar, R. et al.) (Springer, 2022)
Wang, W. et al. Quantum blockchain based on asymmetric quantum encryption and a stake vote consensus algorithm. Sci. Rep. 12, 8606. https://doi.org/10.1038/s41598-022-12412-0 (2022).
Article ADS CAS PubMed PubMed Central Google Scholar
Bansod, S. & Ragha, L. Challenges in making blockchain privacy compliant for the digital world: Some measures. Sadhana 47, 168. https://doi.org/10.1007/s12046-022-01931-1 (2022).
Article PubMed Central Google Scholar
Sentamilselvan, K. et al. Security Threats and Privacy Challenges in the Quantum Blockchain: A Contemporary Survey 1–384 (ed. Kumar R. et al.) (Wiley, 2022).
De Vries, A. Bitcoin's growing energy problem. Joule 2, 801–805 (2018).
Article Google Scholar
Krause, M. J. & Tolaymat, T. Quantification of energy and carbon costs for mining cryptocurrencies. Nat. Sustain. 1, 711–718 (2018).
Article Google Scholar
Vamvakas, P. et al. Exploiting prospect theory and risk-awareness to protect UAV-assisted network operation. J. Wireless. Com. Netw. 2019, 286. https://doi.org/10.1186/s13638-019-1616-9 (2019).
Article Google Scholar
Ali, M. et al. Recent advances and future directions on underwater wireless communications. Arch. Comput. Methods. Eng. 27, 1379–1412. https://doi.org/10.1007/s11831-019-09354-8 (2020).
Article Google Scholar
Aune, S. et al. Timing performance of a multi-pad PICOSEC-micromegas detector prototype. Nucl. Instrum. Methods Phys. Res. A. 993, 165076 (2021).
Article CAS Google Scholar
Hartbrich, A. et al. STOPGAP—a Time-of-Flight Extension for the Belle II TOP Barrel PID System as a Demonstrator for CMOS Fast Timing Sensors. Retrieved from https://arxiv.org/pdf/2203.04847.pdf (2022).
Download references
University of Tokyo, Tokyo, Japan
Hiroyuki K. M. Tanaka
International Virtual Muography Institute (VMI), Global, Tokyo, Japan
Hiroyuki K. M. Tanaka
You can also search for this author in PubMed Google Scholar
H.K.M.T. wrote the text. H.K.M.T. prepared the figures. H.K.M.T. reviewed the manuscript.
Correspondence to Hiroyuki K. M. Tanaka.
The author declares no competing interests.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
Reprints and Permissions
Tanaka, H.K.M. Cosmic coding and transfer storage (COSMOCATS) for invincible key storage. Sci Rep 13, 8746 (2023). https://doi.org/10.1038/s41598-023-35325-y
Download citation
Received: 15 February 2023
Accepted: 16 May 2023
Published: 30 May 2023
DOI: https://doi.org/10.1038/s41598-023-35325-y
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.