Adaptive Authentication Protocol Based on Zero-Knowledge Proof

被引:3
|
作者
Chistousov, Nikita Konstantinovich [1 ]
Kalmykov, Igor Anatolyevich [1 ]
Dukhovnyj, Daniil Vyacheslavovich [1 ]
Kalmykov, Maksim Igorevich [1 ]
Olenev, Aleksandr Anatolyevich [2 ]
机构
[1] North Caucasus Fed Univ Stavropol, Dept Informat Secur Automated Syst, 1 Pushkina Str, Stavropol 355017, Russia
[2] Stavropol State Pedag Inst, 417 Lenina Str, Stavropol 355009, Russia
基金
俄罗斯基础研究基金会;
关键词
modular codes; low-orbit satellite communication systems; satellite identification system; PRIVACY; SCHEME;
D O I
10.3390/a15020050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
引用
下载
收藏
页数:15
相关论文
共 50 条
  • [21] Secure anonymous authentication scheme based on elliptic curve and zero-knowledge proof in VANET
    Li, Jin-Guo
    Lin, Ya-Ping
    Li, Rui
    Zhou, Si-Wang
    Tongxin Xuebao/Journal on Communications, 2013, 34 (05): : 52 - 61
  • [22] Zero-knowledge Location Proof Based on Blockchain
    Yu Rongwei
    Zhou Boxiao
    Wang Lina
    Zhu Xinyan
    Xie Huihua
    Xie Hongjun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (09) : 2142 - 2149
  • [23] Zero-knowledge Location Proof Based on Blockchain
    Yu R.
    Zhou B.
    Wang L.
    Zhu X.
    Xie H.
    Xie H.
    Zhou, Boxiao (boxiao@whu.edu.cn), 1600, Science Press (42): : 2142 - 2149
  • [24] Zero-Knowledge for Anonymous Authentication
    Hajny, Jan
    Pelka, Tomas
    Malina, Lukas
    TSP 2010: 33RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, 2010, : 213 - 218
  • [25] An efficient statistical zero-knowledge authentication protocol for smart cards
    Dousti, Mohammad Sadeq
    Jalili, Rasool
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (03) : 453 - 481
  • [26] A Blockchain-based Protocol of Trusted Setup Ceremony for Zero-knowledge Proof
    Park, Chanik
    Chung, Moonhyeon
    Ryu, Donghyeon
    PROCEEDINGS OF 2023 5TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2023, 2023, : 35 - 40
  • [27] Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof
    Koulianos, Athanasios
    Paraskevopoulos, Panagiotis
    Litke, Antonios
    Papadakis, Nikolaos K.
    SENSORS, 2024, 24 (17)
  • [28] Web Authentication Protocol Using Zero Knowledge Proof
    Thiruvaazhi, U.
    Divya, R.
    INFORMATION SECURITY JOURNAL, 2011, 20 (02): : 112 - 121
  • [29] Card-Based Zero-Knowledge Proof for the Nearest Neighbor Property: Zero-Knowledge Proof of ABC End View
    Fukasawa, Takuro
    Manabe, Yoshifumi
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2022, 2022, 13783 : 147 - 161
  • [30] TinyZKP: A Lightweight Authentication Scheme Based on Zero-Knowledge Proof for Wireless Body Area Networks
    Ma, Limin
    Ge, Yu
    Zhu, Yuesheng
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (02) : 1077 - 1090