Zero-Knowledge Proof and Authentication Protocols

نویسنده

  • Benjamin Lipton
چکیده

Zero-knowledge proofs are a cryptographic technique that allows one entity, the prover, to convince another, the verifier, of the truth of a statement without revealing any information other than that the statement is true. Neither the verifier nor any observer of the interaction between the two parties will have any information they did not have before. The zero-knowledge property provides some desirable characteristics for an authentication protocol. Since a zero-knowledge authentication process provides no new information to an eavesdropper, the protocol is immune to replay attacks. Further, since the verifier never learns anything about the user’s credentials, even an attacker that completely compromises the server still can’t get information that would allow them to impersonate a user.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks

We construct statistical zero-knowledge authentication protocols for smart cards based on general assumptions. The main protocol is only secure against active attacks, but we present a modification based on trapdoor commitments that can resist concurrent attacks as well. Both protocols are instantiated using lattice-based primitives, which are conjectured to be secure against quantum attacks. W...

متن کامل

Designing Protocols for Nuclear Warhead Verification

Future arms-control and disarmament treaties could place numerical limits on all categories of nuclear weapons in the arsenals of weapon states, including tactical weapons, non-deployed weapons, and weapons awaiting dismantlement. Verification of such agreements is likely to require new types of inspection equipment — but also new verification protocols. This paper offers a set of definitions a...

متن کامل

ZEUS - A Domain-Oriented Fact Comparison Based Authentication Protocol

In this paper, facts existing in different domains are explored, which are comparable by their end result. Properties of various domains and the facts that are part of such a unit are also presented, examples of comparison and methods of usage as means of zero-knowledge protocols are given, finally a zero-knowledge protocol based on afore-mentioned concept is given.

متن کامل

Efficient Deniable Authentication for Signatures Application to Machine-Readable Travel Document

Releasing a classical digital signature faces to privacy issues. Indeed, there are cases where the prover needs to authenticate some data without making it possible for any malicious verifier to transfer the proof to anyone else. It is for instance the case for e-passports where the signature from the national authority authenticates personal data. To solve this problem, we can prove knowledge ...

متن کامل

A Survey of Noninteractive Zero Knowledge Proof System and Its Applications

Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms becau...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016