Zero-Knowledge Proof and Authentication Protocols
نویسنده
چکیده
Zero-knowledge proofs are a cryptographic technique that allows one entity, the prover, to convince another, the verifier, of the truth of a statement without revealing any information other than that the statement is true. Neither the verifier nor any observer of the interaction between the two parties will have any information they did not have before. The zero-knowledge property provides some desirable characteristics for an authentication protocol. Since a zero-knowledge authentication process provides no new information to an eavesdropper, the protocol is immune to replay attacks. Further, since the verifier never learns anything about the user’s credentials, even an attacker that completely compromises the server still can’t get information that would allow them to impersonate a user.
منابع مشابه
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks
We construct statistical zero-knowledge authentication protocols for smart cards based on general assumptions. The main protocol is only secure against active attacks, but we present a modification based on trapdoor commitments that can resist concurrent attacks as well. Both protocols are instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. W...
متن کاملDesigning Protocols for Nuclear Warhead Verification
Future arms-control and disarmament treaties could place numerical limits on all categories of nuclear weapons in the arsenals of weapon states, including tactical weapons, non-deployed weapons, and weapons awaiting dismantlement. Verification of such agreements is likely to require new types of inspection equipment — but also new verification protocols. This paper offers a set of definitions a...
متن کاملZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol
In this paper, facts existing in different domains are explored, which are comparable by their end result. Properties of various domains and the facts that are part of such a unit are also presented, examples of comparison and methods of usage as means of zero-knowledge protocols are given, finally a zero-knowledge protocol based on afore-mentioned concept is given.
متن کاملEfficient Deniable Authentication for Signatures Application to Machine-Readable Travel Document
Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicious verifier to transfer the proof to anyone else. It is for instance the case for e-passports where the signature from the national authority authenticates personal data. To solve this problem, we can prove knowledge ...
متن کاملA Survey of Noninteractive Zero Knowledge Proof System and Its Applications
Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms becau...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016