Adaptive Authentication Protocol Based on Zero-Knowledge Proof

被引:3
|
作者
Chistousov, Nikita Konstantinovich [1 ]
Kalmykov, Igor Anatolyevich [1 ]
Dukhovnyj, Daniil Vyacheslavovich [1 ]
Kalmykov, Maksim Igorevich [1 ]
Olenev, Aleksandr Anatolyevich [2 ]
机构
[1] North Caucasus Fed Univ Stavropol, Dept Informat Secur Automated Syst, 1 Pushkina Str, Stavropol 355017, Russia
[2] Stavropol State Pedag Inst, 417 Lenina Str, Stavropol 355009, Russia
基金
俄罗斯基础研究基金会;
关键词
modular codes; low-orbit satellite communication systems; satellite identification system; PRIVACY; SCHEME;
D O I
10.3390/a15020050
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32- and 64-bit adaptive authentication protocols.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] ZERO-KNOWLEDGE PROOF SYSTEMS FOR QMA
    Broadbent, Anne
    Ji, Zhengfeng
    Song, Fang
    Watrous, John
    SIAM JOURNAL ON COMPUTING, 2020, 49 (02) : 245 - 283
  • [42] Physical Zero-Knowledge Proof for Sukoro
    Sasaki, Shun
    Shinagawa, Kazumasa
    NEW GENERATION COMPUTING, 2024, 42 (03) : 381 - 398
  • [43] ON THE COMPOSITION OF ZERO-KNOWLEDGE PROOF SYSTEMS
    GOLDREICH, O
    KRAWCZYK, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 443 : 268 - 282
  • [44] On the composition of zero-knowledge proof systems
    Goldreich, O
    Krawczyk, H
    SIAM JOURNAL ON COMPUTING, 1996, 25 (01) : 169 - 192
  • [45] A Survey on Zero-Knowledge Proof in Blockchain
    Sun, Xiaoqiang
    Yu, F. Richard
    Zhang, Peng
    Sun, Zhiwei
    Xie, Weixin
    Peng, Xiang
    IEEE NETWORK, 2021, 35 (04): : 198 - 205
  • [46] ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof
    Prakash, M.
    Ramesh, K.
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (17): : 25640 - 25667
  • [47] Physical Zero-Knowledge Proof for Makaro
    Bultel, Xavier
    Dreier, Jannik
    Dumas, Jean-Guillaume
    Lafourcade, Pascal
    Miyahara, Daiki
    Mizuki, Takaaki
    Nagao, Atsuki
    Sasaki, Tatsuya
    Shinagawa, Kazumasa
    Sone, Hideaki
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2018, 2018, 11201 : 111 - 125
  • [48] Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment
    Tao, Yang
    Wang, Xi
    Zhang, Rui
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2020, 2020, 12100 : 268 - 283
  • [49] New Complex Sinusoidal Waveform-Based Zero-Knowledge Proof Systems for Efficient Anonymous Authentication
    Kim, Youhyun
    Jeong, Ongee
    Choi, Kevin
    Moon, Inkyu
    Javidi, Bahram
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (12): : 7710 - 7720
  • [50] A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof
    Su, Ziyi
    Wang, Shiwei
    Cai, Hongliu
    Huang, Jiaxuan
    Chen, Yourong
    Zhang, Xudong
    Alam, Muhammad
    ELECTRONICS, 2024, 13 (18)