Research of Web Security Model based on Zero Knowledge Protocol

被引:0
|
作者
Al-Bajjari, Amro Louay [1 ]
Yuan, Ling [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
关键词
Diffie-Hellman protocol; Authentication; Integrity; Confidentiality; Zero Knowledge Protocol (ZKP);
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication property implemented by using Zero Knowledge Protocol (ZKP), the integrity property implemented by using HMAC, and the confidentiality property implemented by using AES. The web security model can demonstrate to handle the man-in-the-middle attack.
引用
收藏
页码:68 / 71
页数:4
相关论文
共 50 条
  • [31] Image Based Authentication Using Zero-Knowledge Protocol
    Mohamad, Zarina
    Thong, Lim Yan
    Zakaria, Aznida Hayati
    Awang, Wan Suryani Wan
    2018 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND TECHNOLOGY APPLICATIONS (ICCTA), 2018, : 202 - 210
  • [32] GROUP COMMITMENT PROTOCOL BASED ON ZERO-KNOWLEDGE PROOFS
    WU, TC
    WU, TS
    COMPUTER COMMUNICATIONS, 1995, 18 (09) : 654 - 656
  • [33] Adaptive Authentication Protocol Based on Zero-Knowledge Proof
    Chistousov, Nikita Konstantinovich
    Kalmykov, Igor Anatolyevich
    Dukhovnyj, Daniil Vyacheslavovich
    Kalmykov, Maksim Igorevich
    Olenev, Aleksandr Anatolyevich
    ALGORITHMS, 2022, 15 (02)
  • [34] Enhancing privacy and security in 5G networks with an anonymous handover protocol based on Blockchain and Zero Knowledge Proof
    Haddad, Zaher
    COMPUTER NETWORKS, 2024, 250
  • [35] A Security Model for Web-Based Communication
    Tehrani, Pouyan Fotouhi
    Osterweil, Eric
    Schmidt, Thomas C.
    Waehlisch, Matthias
    COMMUNICATIONS OF THE ACM, 2024, 67 (10) : 83 - 90
  • [36] Model based security verification of protocol implementation
    Fu, Yulong
    Kone, Ousmane
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 : 17 - 27
  • [37] Challenges of Web-based Information Security Knowledge Sharing
    Feledi, Daniel
    Fenz, Stefan
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 514 - 521
  • [38] Security Concerns for Web-based Research Survey
    Hailu, Alemayehu
    Rahman, Syed M.
    2012 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (ICECE), 2012,
  • [39] Research on security service of PDM system based on Web
    Shanghai University, Shanghai 200072, China
    Zhongguo Jixie Gongcheng, 2006, SUPPL. 2 (262-265):
  • [40] Research and realization of security proxy based on SSL protocol
    Wang, Yanhua
    Yang, Kuihe
    Zhang, Yun
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL II, 2007, : 264 - 267