Adaptive Authentication Protocol Based on Zero-Knowledge Proof

被引:4
|
作者
Chistousov, Nikita Konstantinovich [1 ]
Kalmykov, Igor Anatolyevich [1 ]
Dukhovnyj, Daniil Vyacheslavovich [1 ]
Kalmykov, Maksim Igorevich [1 ]
Olenev, Aleksandr Anatolyevich [2 ]
机构
[1] North Caucasus Fed Univ Stavropol, Dept Informat Secur Automated Syst, 1 Pushkina Str, Stavropol 355017, Russia
[2] Stavropol State Pedag Inst, 417 Lenina Str, Stavropol 355009, Russia
基金
俄罗斯基础研究基金会;
关键词
modular codes; low-orbit satellite communication systems; satellite identification system; PRIVACY; SCHEME;
D O I
10.3390/a15020050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] ZGridBC: Zero-Knowledge Proof Based Scalable and Privacy-Enhanced Blockchain Platform for Electricity Tracking
    Miyamae, Takeshi
    Kozakura, Fumihiko
    Nakamura, Makoto
    Morinaga, Masanobu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (07) : 1219 - 1229
  • [22] Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things
    Dwivedi, Ashutosh Dhar
    Singh, Rajani
    Ghosh, Uttam
    Mukkamala, Raghava Rao
    Tolba, Amr
    Said, Omar
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (10) : 4639 - 4649
  • [23] zk-DASTARK: A quantum-resistant, data authentication and zero-knowledge proof scheme for protecting data feed to smart contracts
    Chaudhry, Usama Habib
    Arshad, Razi
    Khalid, Ayesha
    Ray, Indranil Ghosh
    Hussain, Mehdi
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [24] Zero-Knowledge Proofs for Blockchains
    Ruj, Sushmita
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 67 - 68
  • [25] BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs
    Khernane, Nesrine
    Potop-Butucaru, Maria
    Chaudet, Claude
    PROCEEDINGS 2016 IEEE 13TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS 2016), 2016, : 307 - 315
  • [26] Blockchain-Enhanced Zero Knowledge Proof-Based Privacy-Preserving Mutual Authentication for IoT Networks
    Pathak, Aditya
    Al-Anbagi, Irfan
    Hamilton, Howard J.
    IEEE ACCESS, 2024, 12 : 118618 - 118636
  • [27] Zero-Knowledge Accumulators and Set Algebra
    Ghosh, Esha
    Ohrimenko, Olga
    Papadopoulos, Dimitrios
    Tamassia, Roberto
    Triandopoulos, Nikos
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 : 67 - 100
  • [28] Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge
    Pardeshi, Mayuresh Sunil
    Sheu, Ruey-Kai
    Yuan, Shyan-Ming
    SENSORS, 2022, 22 (02)
  • [29] Circuitree: A Datalog Reasoner in Zero-Knowledge
    Godden, Tom
    De Smet, Ruben
    Debruyne, Christophe
    Vandervelden, Thibaut
    Steenhaut, Kris
    Braeken, An
    IEEE ACCESS, 2022, 10 : 21384 - 21396
  • [30] Symbolic Malleable Zero-knowledge Proofs
    Backes, Michael
    Bendun, Fabian
    Maffei, Matteo
    Mohammadi, Esfandiar
    Pecina, Kim
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 412 - 426