Research of Web Security Model based on Zero Knowledge Protocol

被引:0
|
作者
Al-Bajjari, Amro Louay [1 ]
Yuan, Ling [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci, Wuhan 430072, Hubei, Peoples R China
关键词
Diffie-Hellman protocol; Authentication; Integrity; Confidentiality; Zero Knowledge Protocol (ZKP);
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper mainly focus on designing and implementing a web security model in order to protect the network from any potential threats and attacks. When the email and information exchange between two parties over insecure channels, a web security model with optimized zero knowledge protocol can be used to identify the authentication between two parties. The proposed security model can achieve the authentication property implemented by using Zero Knowledge Protocol (ZKP), the integrity property implemented by using HMAC, and the confidentiality property implemented by using AES. The web security model can demonstrate to handle the man-in-the-middle attack.
引用
收藏
页码:68 / 71
页数:4
相关论文
共 50 条
  • [41] A PRACTICAL ZERO-KNOWLEDGE PROTOCOL FITTED TO SECURITY MICROPROCESSOR MINIMIZING BOTH TRANSMISSION AND MEMORY
    GUILLOU, LC
    QUISQUATER, JJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 330 : 123 - 128
  • [42] Research on Web Services Composition Based on Behavior Protocol
    Chi, Zhang
    2009 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING ( GRC 2009), 2009, : 761 - 764
  • [43] The design and implementation of Web network security system based on SSL protocol
    Tan, Xianru
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 539 - 543
  • [44] Research on Telecommuting Security Solution Based on Zero Trust Architecture
    Kou, Wanli
    Zhou, Huaizhe
    Du, Jia
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 82 - 89
  • [45] Web based Security with LOPass User Authentication Protocol in Mobile Application
    Bhole, Ashish T.
    Chaudhari, Sheetal
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 250 - 255
  • [46] The design and implementation of Web network security system based on SSL protocol
    Tan, Xianru
    FUTURE INFORMATION TECHNOLOGY, 2011, 13 : 285 - 289
  • [47] Model-driven security based on a Web services security architecture
    Nakamura, Y
    Tatsubori, M
    Imamura, T
    Ono, K
    2005 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, VOL 1, PROCEEDINGS, 2005, : 7 - 15
  • [48] An RFID Zero-Knowledge Authentication Protocol Based on Quadratic Residues
    Song, Jian
    Harn, Po-Wei
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14): : 12813 - 12824
  • [49] Knowledge Based Security Model for Banking in Cloud
    Auxilia, M.
    Raja, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [50] Security analysis of security protocol Swift implementations based on computational model
    Meng B.
    He X.
    Zhang J.
    Yao L.
    Lu J.
    Tongxin Xuebao/Journal on Communications, 2018, 39 (09): : 178 - 190