Skip to main content

A Method for Authenticating Based on ZKp in Distributed Environment

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3358))

  • 513 Accesses

Abstract

A new ZKp identity protocol is proposed in this paper. It is more appropriate than the traditional identity protocol in distributed environment without an identical trusted third party. The security of this protocol relies on the discrete logarithm problem on conic over finite fields. It can be designed and implemented easier than those on elliptic curve. A simple solution is proposed to prevent a potential leak of our protocol.

Supported by the National Natural Science Foundation of China under Grant No. 90204010

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. Journal of Cryptology 1(2), 77–94 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  2. Miller, V.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  3. Cao, Z.: A Public Key Crypto -system Based on a Conic Over Finite Fields Fp. In: CHINACRYPT 1998, pp. 45–49 (1998)

    Google Scholar 

  4. Desmedt, Y.G.: Abuses in cryptography and how to fight them. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 375–389. Springer, Heidelberg (1990)

    Google Scholar 

  5. Goldreich, O., Krawcyzk, H.: On the Composition of Zero-Knowledge Proof Systems. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol. 443, pp. 268–282. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  6. Zhang, M.: Factoring Integers With Conic. Journal of Sichuan University(Natural Science Edition) 33(4), 356–359 (1996)

    MATH  MathSciNet  Google Scholar 

  7. Pei, D., Wang, X.: Encryption Authentication Code on Conic over Finite Field. Science In China (Series E) 26(5), 385–394 (1996)

    MathSciNet  Google Scholar 

  8. Cao, Z.: Conic analog of RSA cryptosystem and some improved RSA cryptosystems. Journal of Natural Science of Heilongjiang University 16(4), 15–18 (1999)

    MATH  MathSciNet  Google Scholar 

  9. Beth, T.: Efficient zero-knowledge identification scheme for smart cards. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 77–84. Springer, Heidelberg (1988)

    Google Scholar 

  10. Gamal, E.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4), 469–472 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  11. Guillou, L.C., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)

    Google Scholar 

  12. Brandt, J., Damgard, I., Landrock, P., et al.: Zero knowledge scheme with secret key exchange. In: Proceedings on Advances in Cryptology, pp. 583–585 (1990)

    Google Scholar 

  13. Goldreich, O.: Foundations of crypto- graphy: basic tools, pp. 270–274. Cambridge University Press, New York (2001)

    Book  Google Scholar 

  14. Binder, J., Bischof, H.-P.: Zero knowledge proofs of identity for ad hoc wireless networks (2003), http://www.cs.rit.edu/~jsb7384/zkp-survey.pdf

  15. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computers and Security, pp. 83–91. ACM Press, New York (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, D., Liu, M., Yang, Z. (2004). A Method for Authenticating Based on ZKp in Distributed Environment. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds) Parallel and Distributed Processing and Applications. ISPA 2004. Lecture Notes in Computer Science, vol 3358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30566-8_85

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30566-8_85

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24128-7

  • Online ISBN: 978-3-540-30566-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics