New Complex Sinusoidal Waveform-Based Zero-Knowledge Proof Systems for Efficient Anonymous Authentication

被引:0
|
作者
Kim, Youhyun [1 ]
Jeong, Ongee [1 ]
Choi, Kevin [2 ]
Moon, Inkyu [3 ]
Javidi, Bahram [4 ]
机构
[1] Daegu Gyeongbuk Inst Sci & Technol, Dept Robot & Mechatron Engn, Daegu 42988, South Korea
[2] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[3] Daegu Gyeongbuk Inst Sci & Technol, Dept Robot Engn, Daegu 42988, South Korea
[4] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT USA
基金
新加坡国家研究基金会;
关键词
Authentication; Protocols; Servers; Visualization; Optical imaging; Optical sensors; Moon; Internet of Things; High-speed optical techniques; Robustness; Anonymous authentication system; Feige-Fiat-Shamir (FFS) protocol; image cryptography; interactive proof system; zero-knowledge proof system; MULTIPLE-IMAGE ENCRYPTION; INFORMATION; INTERNET; THINGS; IOT;
D O I
10.1109/TSMC.2024.3460801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-knowledge proof systems based on Feige-Fiat-Shamir (FFS) protocol are an interactive protocol between two anonymous authentication parties. However, they require heavy computations because of many iterations for reducing the probability that an attacker can trick a remote server. The algorithm's time complexity rapidly increases with the total number of the challenge values, which should be unpredictable. Hence, the FFS protocol is not suitable for practical zero-knowledge proof systems. In this study, we propose new zero-knowledge proof systems based on phase mask generation that are complex sinusoidal waveform versions of the FFS algorithm for efficient anonymous authentication in the diverse interactive systems. The proposed anonymous authentication schemes need a single iteration only, allowing for efficient uses of a random challenge mask with large bit-depth. The proposed schemes allow the verifier to verify that the prover knows the secret mask, such as binary pattern, visual image, or hologram, which are the prover's secrets, without revealing any information about it to anyone else, including the verifier. Various numerical simulations demonstrate the proposed schemes' feasibility and robustness.
引用
收藏
页码:7710 / 7720
页数:11
相关论文
共 50 条
  • [1] Zero-Knowledge for Anonymous Authentication
    Hajny, Jan
    Pelka, Tomas
    Malina, Lukas
    TSP 2010: 33RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, 2010, : 213 - 218
  • [2] Secure anonymous authentication scheme based on elliptic curve and zero-knowledge proof in VANET
    Li, Jin-Guo
    Lin, Ya-Ping
    Li, Rui
    Zhou, Si-Wang
    Tongxin Xuebao/Journal on Communications, 2013, 34 (05): : 52 - 61
  • [3] Zero-Knowledge Proof Authentication Protocols
    Ratseev, S. M.
    Rostov, M. A.
    IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA, 2019, 19 (01): : 114 - 121
  • [4] Adaptive Authentication Protocol Based on Zero-Knowledge Proof
    Chistousov, Nikita Konstantinovich
    Kalmykov, Igor Anatolyevich
    Dukhovnyj, Daniil Vyacheslavovich
    Kalmykov, Maksim Igorevich
    Olenev, Aleksandr Anatolyevich
    ALGORITHMS, 2022, 15 (02)
  • [5] A Distributed Authentication Scheme Based on Zero-knowledge Proof
    Qin, Lang
    Ma, Feng
    Xie, Hao Geng
    Zhang, Sheng Li
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS AND COMPUTER ENGINEERING (ICCECE), 2021, : 203 - 207
  • [6] GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF
    Shliakhtina, E. A.
    Gamayunov, D. Y.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2021, (51): : 68 - 84
  • [7] ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof
    Prakash, M.
    Ramesh, K.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (17): : 25640 - 25667
  • [8] Introducing proxy zero-knowledge proof and utilization in anonymous credential systems
    Jannati, Hoda
    Salmasizadeh, Mahmoud
    Mohajeri, Javad
    Moradi, Amir
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 161 - 172
  • [9] Threshold anonymous group identification and zero-knowledge proof
    Yamamura, Akihiro
    Kurokawa, Takashi
    Nakazato, Junji
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 370 - +
  • [10] A Cross-domain Authentication Scheme Based on Zero-Knowledge Proof
    Du, Ruizhong
    Li, Xiaoya
    Liu, Yan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II, 2022, 13156 : 647 - 664