Adaptive Authentication Protocol Based on Zero-Knowledge Proof

被引:4
|
作者
Chistousov, Nikita Konstantinovich [1 ]
Kalmykov, Igor Anatolyevich [1 ]
Dukhovnyj, Daniil Vyacheslavovich [1 ]
Kalmykov, Maksim Igorevich [1 ]
Olenev, Aleksandr Anatolyevich [2 ]
机构
[1] North Caucasus Fed Univ Stavropol, Dept Informat Secur Automated Syst, 1 Pushkina Str, Stavropol 355017, Russia
[2] Stavropol State Pedag Inst, 417 Lenina Str, Stavropol 355009, Russia
基金
俄罗斯基础研究基金会;
关键词
modular codes; low-orbit satellite communication systems; satellite identification system; PRIVACY; SCHEME;
D O I
10.3390/a15020050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Non-interactive Zero-Knowledge from LPN and MQ
    Dao, Quang
    Jain, Aayush
    Jin, Zhengzhong
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IX, 2024, 14928 : 321 - 360
  • [42] An Efficient and Zero-Knowledge Classical Machine Learning Inference Pipeline
    Wang, Haodi
    Bie, Rongfang
    Hoang, Thang
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1347 - 1364
  • [43] Split: A Hash-Based Memory Optimization Method for Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK)
    Qi, Huayi
    Cheng, Ye
    Xu, Minghui
    Yu, Dongxiao
    Wang, Haipeng
    Lyu, Weifeng
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (07) : 1857 - 1870
  • [44] PTTS: Zero-knowledge proof-based private token transfer system on Ethereum blockchain and its network flow based balance range privacy attack analysis
    Ismayilov, Goshgar
    Ozturan, Can
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 233
  • [45] psvCNN: A Zero-Knowledge CNN Prediction Integrity Verification Strategy
    Fan, Yongkai
    Xu, Binyuan
    Zhang, Linlin
    Tan, Gang
    Yu, Shui
    Li, Kuan-Ching
    Zomaya, Albert
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (02) : 359 - 369
  • [46] On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings
    Applebaum, Benny
    Raykov, Pavel
    ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 : 449 - 477
  • [47] Combating Identity Attacks in Online Social Networks: A Multi-Layered Framework Using Zero-Knowledge Proof and Permissioned Blockchain
    Alam, Md Jahangir
    Hossain, Ismail
    Puppala, Sai
    Talukder, Sajedul
    PROCEEDINGS OF THE 2023 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING, ASONAM 2023, 2023, : 637 - 644
  • [48] zk-DCIAExchange: SGX protected fair exchange with distributed zero knowledge proof for data confidentiality and authentication
    Zhan, Jing
    Li, Bo
    Zhao, Jiang
    Zhao, Yong
    COMPUTER JOURNAL, 2025,
  • [49] Efficient Designated-Verifier Non-interactive Zero-Knowledge Proofs of Knowledge
    Chaidos, Pyrros
    Couteau, Geoffroy
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 193 - 221
  • [50] The yoking-proof-based authentication protocol for cloud-assisted wearable devices
    Liu, Wei
    Liu, Hong
    Wan, Yueliang
    Kong, Huafeng
    Ning, Huansheng
    PERSONAL AND UBIQUITOUS COMPUTING, 2016, 20 (03) : 469 - 479