Publications

Research papers, patents, and technical whitepapers.

whitepaper2026| Zenodo

SITUS Protocol: Sensor-Integrated Trust Using Spatial Entropy

Prateek Singh

A cryptographic framework that binds authentication events to the unrepeatable physical context in which they occur. SITUS formalizes Environmental Entropy Vectors (EEVs) as a cryptographic primitive, combining cross-correlated sensor data into the authentication process. Through a commit-before-challenge protocol, cross-sensor consistency validation, adaptive risk thresholds, and temporal decay functions, SITUS ensures that credentials are not only non-transferable but non-relocatable.

DOI: 10.5281/zenodo.19024600

whitepaper2026| Zenodo

KAVI Protocol: Keyless Adaptive Verification through Identity

Prateek Singh

KAVI introduces three novel cryptographic primitives — Surprise Signature, Ghost Key Architecture, and Trinity Binding — that eliminate stored credentials entirely. Authentication is derived from AI prediction residuals of human behavior, creating a system where identity cannot be stolen because it never exists as a persistent artifact.

DOI: 10.5281/zenodo.18652605

whitepaper2026| Zenodo

AVIK: Adaptive Verified Identity Keys — A Practical Protocol for Takeover-Resistant Authentication

Prateek Singh

Account takeover persists not because login is weak, but because the controls surrounding login are. AVIK composes four cryptographic controls into a single enforceable model: passwordless identity proof via challenge-response signatures, per-request proof-of-possession, explicit identity-signed intent for high-risk actions, and a recovery ceremony that prevents assurance downgrade.

DOI: 10.5281/zenodo.18652925