Adaptive Authentication Protocol Based on Zero-Knowledge Proof

被引:3
|
作者
Chistousov, Nikita Konstantinovich [1 ]
Kalmykov, Igor Anatolyevich [1 ]
Dukhovnyj, Daniil Vyacheslavovich [1 ]
Kalmykov, Maksim Igorevich [1 ]
Olenev, Aleksandr Anatolyevich [2 ]
机构
[1] North Caucasus Fed Univ Stavropol, Dept Informat Secur Automated Syst, 1 Pushkina Str, Stavropol 355017, Russia
[2] Stavropol State Pedag Inst, 417 Lenina Str, Stavropol 355009, Russia
基金
俄罗斯基础研究基金会;
关键词
modular codes; low-orbit satellite communication systems; satellite identification system; PRIVACY; SCHEME;
D O I
10.3390/a15020050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
引用
下载
收藏
页数:15
相关论文
共 50 条
  • [1] User Authentication in SSL Handshake Protocol with Zero-Knowledge Proof
    Than Myo Zaw
    Min Thant
    Bezzateev, S. V.
    2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
  • [2] Zero-Knowledge Proof Authentication Protocols
    Ratseev, S. M.
    Rostov, M. A.
    IZVESTIYA SARATOVSKOGO UNIVERSITETA NOVAYA SERIYA-MATEMATIKA MEKHANIKA INFORMATIKA, 2019, 19 (01): : 114 - 121
  • [3] A Distributed Authentication Scheme Based on Zero-knowledge Proof
    Qin, Lang
    Ma, Feng
    Xie, Hao Geng
    Zhang, Sheng Li
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS AND COMPUTER ENGINEERING (ICCECE), 2021, : 203 - 207
  • [4] GROUP AUTHENTICATION SCHEME BASED ON ZERO-KNOWLEDGE PROOF
    Shliakhtina, E. A.
    Gamayunov, D. Y.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2021, (51): : 68 - 84
  • [5] Image Based Authentication Using Zero-Knowledge Protocol
    Mohamad, Zarina
    Thong, Lim Yan
    Zakaria, Aznida Hayati
    Awang, Wan Suryani Wan
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), 2018, : 202 - 210
  • [6] Using Adaptive Zero-Knowledge Authentication Protocol in VANET Automotive Network
    Kalmykov, Igor Anatolyevich
    Olenev, Aleksandr Anatolyevich
    Kalmykova, Natalia Igorevna
    Dukhovnyj, Daniil Vyacheslavovich
    INFORMATION, 2023, 14 (01)
  • [7] An RFID Zero-Knowledge Authentication Protocol Based on Quadratic Residues
    Song, Jian
    Harn, Po-Wei
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14): : 12813 - 12824
  • [8] An authentication protocol based on chaos and zero knowledge proof
    Major, Will
    Buchanan, William J.
    Ahmad, Jawad
    NONLINEAR DYNAMICS, 2020, 99 (04) : 3065 - 3087
  • [9] An authentication protocol based on chaos and zero knowledge proof
    Will Major
    William J. Buchanan
    Jawad Ahmad
    Nonlinear Dynamics, 2020, 99 : 3065 - 3087
  • [10] Physical Zero-Knowledge Proof Protocol for Topswops
    Komano, Yuichi
    Mizuki, Takaaki
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 537 - 553