Publications

Research papers, patents, and technical whitepapers.

whitepaper2026| Zenodo

KAVI Protocol: Keyless Adaptive Verification through Identity

Prateek Singh

KAVI introduces three novel cryptographic primitives — Surprise Signature, Ghost Key Architecture, and Trinity Binding — that eliminate stored credentials entirely. Authentication is derived from AI prediction residuals of human behavior, creating a system where identity cannot be stolen because it never exists as a persistent artifact.

DOI: 10.5281/zenodo.18652605

whitepaper2026| Zenodo

AVIK: Adaptive Verified Identity Keys — A Practical Protocol for Takeover-Resistant Authentication

Prateek Singh

Account takeover persists not because login is weak, but because the controls surrounding login are. AVIK composes four cryptographic controls into a single enforceable model: passwordless identity proof via challenge-response signatures, per-request proof-of-possession, explicit identity-signed intent for high-risk actions, and a recovery ceremony that prevents assurance downgrade.

DOI: 10.5281/zenodo.18652925