GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF

被引:0
作者
Shliakhtina, E. A. [1 ]
Gamayunov, D. Y. [1 ]
机构
[1] Lomonosov Moscow State Univ, Moscow, Russia
来源
PRIKLADNAYA DISKRETNAYA MATEMATIKA | 2021年 / 51期
关键词
authentication; zero-knowledge proof; decentralized communications; EFFICIENT;
D O I
10.17223/20710410/51/3
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we address the problem of mutual authentication in user groups in decentralized messaging systems without trusted third party. We propose a mutual authentication algorithm for groups using zero-knowledge proof. Using the algorithm, which is based on trust chains existing in decentralized network, users are able to authenticate each other without establishing a shared secret over side channel. The proposed algorithm is based on Democratic Group Signature protocol (DGS) and Communication-Computation Efficient Group Key algorithm for large and dynamic groups (CCEGK). We have performed security analysis of the proposed mutual authentication scheme against several attacks including Sybil attack and have made complexity estimation for the algorithm. The algorithm is implemented in an experimental P2P group messaging application, and using this implementation we estimate overhead of the authentication scheme and convergence time for several initial configurations of user groups and trust chains.
引用
收藏
页码:68 / 84
页数:17
相关论文
共 18 条
[1]  
Alves-Foss J., 2000, P 23 NAT INF SYST SE, P254
[2]  
[Anonymous], Chain of groups method realisation for decentralized chat
[3]  
[Anonymous], 2006, ASIACCS
[4]  
[Anonymous], 2016, 3 HALF DEGREES SEPAR
[5]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[6]   A fair and efficient solution to the socialist millionaires' problem [J].
Boudot, F ;
Schoenmakers, B ;
Traoré, J .
DISCRETE APPLIED MATHEMATICS, 2001, 111 (1-2) :23-36
[7]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[8]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[9]  
Goldberg I, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P358
[10]   Group key agreement efficient in communication [J].
Kim, Y ;
Perrig, A ;
Tsudik, G .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (07) :905-921