Adaptive authentication protocol based on zero-knowledge proof
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation syst...
Guardado en:
Autores principales: | , , , , , , , |
---|---|
Formato: | Статья |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://dspace.ncfu.ru/handle/20.500.12258/18814 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
ir-20.500.12258-18814 |
---|---|
record_format |
dspace |
spelling |
ir-20.500.12258-188142022-02-14T08:29:34Z Adaptive authentication protocol based on zero-knowledge proof Chistousov, N. K. Чистоусов, Н. К. Kalmykov, I. A. Калмыков, И. А. Dukhovnyj, D. V. Духовный, Д. В. Kalmykov, M. I. Калмыков, М. И. Low-orbit satellite communication systems Modular codes Satellite identification system Satellites Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32-and 64-bit adaptive authentication protocols. 2022-02-14T08:26:09Z 2022-02-14T08:26:09Z 2022 Статья Chistousov, N. K., Kalmykov, I. A., Dukhovnyj, D. V., Kalmykov, M. I., Olenev, A. A. Adaptive authentication protocol based on zero-knowledge proof // Algorithms. - 2022. - Том 15. - Выпуск 2. - Номер статьи 50. - DOI10.3390/a15020050 http://hdl.handle.net/20.500.12258/18814 en Algorithms application/pdf MDPI |
institution |
СКФУ |
collection |
Репозиторий |
language |
English |
topic |
Low-orbit satellite communication systems Modular codes Satellite identification system Satellites |
spellingShingle |
Low-orbit satellite communication systems Modular codes Satellite identification system Satellites Chistousov, N. K. Чистоусов, Н. К. Kalmykov, I. A. Калмыков, И. А. Dukhovnyj, D. V. Духовный, Д. В. Kalmykov, M. I. Калмыков, М. И. Adaptive authentication protocol based on zero-knowledge proof |
description |
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Internet of Things, intelligent transportation systems (ITS), Vehicular Ad Hoc Network (VANET). This is due to the fact that authentication protocols effectively resist a number of attacks on wireless data transmission channels in these systems. The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem in delivering keys to the sides of the prover and the verifier. At the same time, compromising of keys will lead to a decrease in the level of protection of the transmitted data. Zero-knowledge authentication protocols (ZKAP) are able to eliminate this disadvantage. However, most of these protocols use multiple rounds to authenticate the prover. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been developed in this protocol to increase its efficiency. Reductions in the level of confidentiality allow us to reduce the time spent on the execution of the authentication protocol. This increases the volume of information traffic. At the same time, an increase in the confidentiality of the protocol entails an increase in the time needed for authentication of the prover, which reduces the volume of information traffic. The FPGA Artix-7 xc7a12ticsg325-1L was used to estimate the time spent implementing the adaptive ZKAP protocol. Testing was performed for 32-and 64-bit adaptive authentication protocols. |
format |
Статья |
author |
Chistousov, N. K. Чистоусов, Н. К. Kalmykov, I. A. Калмыков, И. А. Dukhovnyj, D. V. Духовный, Д. В. Kalmykov, M. I. Калмыков, М. И. |
author_facet |
Chistousov, N. K. Чистоусов, Н. К. Kalmykov, I. A. Калмыков, И. А. Dukhovnyj, D. V. Духовный, Д. В. Kalmykov, M. I. Калмыков, М. И. |
author_sort |
Chistousov, N. K. |
title |
Adaptive authentication protocol based on zero-knowledge proof |
title_short |
Adaptive authentication protocol based on zero-knowledge proof |
title_full |
Adaptive authentication protocol based on zero-knowledge proof |
title_fullStr |
Adaptive authentication protocol based on zero-knowledge proof |
title_full_unstemmed |
Adaptive authentication protocol based on zero-knowledge proof |
title_sort |
adaptive authentication protocol based on zero-knowledge proof |
publisher |
MDPI |
publishDate |
2022 |
url |
https://dspace.ncfu.ru/handle/20.500.12258/18814 |
work_keys_str_mv |
AT chistousovnk adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT čistousovnk adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT kalmykovia adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT kalmykovia adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT dukhovnyjdv adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT duhovnyjdv adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT kalmykovmi adaptiveauthenticationprotocolbasedonzeroknowledgeproof AT kalmykovmi adaptiveauthenticationprotocolbasedonzeroknowledgeproof |
_version_ |
1760599386077790208 |