• No results found

zero-knowledge protocol

Implementation of Zero Knowledge Protocol in Wireless Security

Implementation of Zero Knowledge Protocol in Wireless Security

... 2 Principle, Shah and Anchor Kutchhi Engineering College, Mumbai ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - ...

5

Authentication and Proofing Using Zero Knowledge Protocol

Authentication and Proofing Using Zero Knowledge Protocol

... Keywords: Zero Knowledge Protocol, Sensor nodes, Cryptography, Prover, Verifier I. INTRODUCTION Sensor Nodes are basically battery powered with limited computation capability, Cluster Heads are Nodes ...

7

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

... A zero-knowledge protocol is secure alternative to modern authentication systems because it allows for user authentication without transmitting vital ...

10

A  Generic  View  on  the  Unified  Zero-Knowledge  Protocol   and  its  Applications

A Generic View on the Unified Zero-Knowledge Protocol and its Applications

... authentication protocol presented in [2] represents such an ...generic zero-knowledge ...our protocol can be applied for securing WSNs and, more generally, IoT-related ...

12

Wireless Sensor Network Security model using Zero Knowledge Protocol

Wireless Sensor Network Security model using Zero Knowledge Protocol

... Keywords-component; Avoid MITM, Replay attacks, Attacks in WSN, ZKP protocol I. INTRODUCTION Advances in technology have made it possible to develop sensor nodes which are compact and inexpensive. They are mounted ...

5

Universally composable zero-knowledge protocol using trusted platform modules

Universally composable zero-knowledge protocol using trusted platform modules

... tiple zero-knowledge protocol instances are executed simultaneously (in parallel) in the same environment ...of zero-knowledge proofs, but is still strong enough to be very helpful in ...

43

A  Zero-Knowledge  Identification   and  Key  Agreement  Protocol

A Zero-Knowledge Identification and Key Agreement Protocol

... Concurrent Zero-knowledge The zero-knowledge property of our protocol is preserved under three types of composition of sessions of the protocol, namely, sequential composition, ...

18

Zero  Knowledge   and  Soundness  are  Symmetric

Zero Knowledge and Soundness are Symmetric

... the zero-knowledge condition, which says that the verifier “learns nothing” other than the fact the assertion being proven is true, and (2) the soundness conditions, which says that the prover cannot ...

32

Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds

Concurrent non-malleable zero-knowledge and simultaneous resettable non-malleable zero-knowledge in constant rounds

... current zero-knowledge protocol require at least ( log n) ...non-malleable zero- knowledge ...malleable zero-knowledge argument system for NP in the Bare Public-Key ...

15

Concurrent  Non-Malleable  Zero  Knowledge

Concurrent Non-Malleable Zero Knowledge

... This completes the proof except for the proof of Claim 2.6. 2.5.1 Proof of Claim 2.6 This is the most delicate part of the proof, which reduces the concurrent non-malleability of our zero- knowledge ...

28

Practical  Relativistic  Zero-Knowledge  for  NP

Practical Relativistic Zero-Knowledge for NP

... 1-round) zero-knowledge protocol for NP secure against quantum adversaries,” in Advances in Cryptology – EUROCRYPT 2017: 36th Annual International Conference on the Theory and Applications of ...

17

Proposal  for  Protocol  on  a  Quorum  Blockchain  with  Zero  Knowledge

Proposal for Protocol on a Quorum Blockchain with Zero Knowledge

... Le Lab Banque de France , Paris November 10, 2017 Abstract In this paper, we present an implementation scheme of an RTGS 1 on Quorum using the Solidity language. It is heavily inspired by the Schnorr signature ...

22

M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol

M-Pin: A Multi-Factor Zero Knowledge Authentication Protocol

... particular to the protocols suggested here), a more intelligent response is possible rather than the classic and simplistic “3-strikes-and-you-are-out” mechanism. A server might attempt to intelligently distinguish ...

12

Guillou-quisquater protocol for user authentication based on zero knowledge proof

Guillou-quisquater protocol for user authentication based on zero knowledge proof

... Authentication is the act of confirming the validity of someone’s personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not ...

9

AN EFFICIENT AUTHENTICATION PROTOCOL USING ZERO  KNOWLEDGE PROPERTY AND PAIRING ON ELLIPTIC CURVES

AN EFFICIENT AUTHENTICATION PROTOCOL USING ZERO KNOWLEDGE PROPERTY AND PAIRING ON ELLIPTIC CURVES

... to zero knowledge proof protocol has important theoretical guidance and practical significance on attracting more scholars involved in research as well as expanding application ...fields. ...

5

Zero-Knowledge  in  the  Applied  Pi-calculus   and  Automated  Verification  of  the  Direct  Anonymous  Attestation  Protocol

Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol

... W e obtain a nite set of rules since the number of ZK F i,j and Ver F i,j constructors corre- sponds to the (nite) number of formulas occurring in the process specication. The PZK F i,j functions are private; hence they ...

48

Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol

Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol

... general-purpose zero-knowledge proofs were mainly invented to show the mere existence of such proofs for the class of statements under ...efficient zero-knowledge proofs for special classes of ...

43

Bringing  Zero-Knowledge  Proofs  of  Knowledge  to  Practice

Bringing Zero-Knowledge Proofs of Knowledge to Practice

... Efficiency of code. As mentioned above, the “efficiency of code” challenge has to be dealt with on two levels. On a high level, the compiler has to find the most efficient protocol specification meeting a given ...

12

Isolated  Proofs  of  Knowledge   and  Isolated  Zero  Knowledge

Isolated Proofs of Knowledge and Isolated Zero Knowledge

... interactive protocol where one party acts as a prover to securely prove its identity to another party acting as a ...of knowledge of the corresponding secret ...proving knowledge of either his or the ...

33

Interactive and zero-knowledge proofs

Interactive and zero-knowledge proofs

... Interactive and zero-knowledge proofs Molli Noland Follow this and additional works at: http://scholarworks.rit.edu/theses This Thesis is brought to you for free and open access by the Thesis/Dissertation ...

117

Show all 10000 documents...

Related subjects