Abstract
A new ZKp identity protocol is proposed in this paper. It is more appropriate than the traditional identity protocol in distributed environment without an identical trusted third party. The security of this protocol relies on the discrete logarithm problem on conic over finite fields. It can be designed and implemented easier than those on elliptic curve. A simple solution is proposed to prevent a potential leak of our protocol.
Supported by the National Natural Science Foundation of China under Grant No. 90204010
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Feige, U., Fiat, A., Shamir, A.: Zero Knowledge Proofs of Identity. Journal of Cryptology 1(2), 77–94 (1988)
Miller, V.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Cao, Z.: A Public Key Crypto -system Based on a Conic Over Finite Fields Fp. In: CHINACRYPT 1998, pp. 45–49 (1998)
Desmedt, Y.G.: Abuses in cryptography and how to fight them. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 375–389. Springer, Heidelberg (1990)
Goldreich, O., Krawcyzk, H.: On the Composition of Zero-Knowledge Proof Systems. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol. 443, pp. 268–282. Springer, Heidelberg (1990)
Zhang, M.: Factoring Integers With Conic. Journal of Sichuan University(Natural Science Edition) 33(4), 356–359 (1996)
Pei, D., Wang, X.: Encryption Authentication Code on Conic over Finite Field. Science In China (Series E) 26(5), 385–394 (1996)
Cao, Z.: Conic analog of RSA cryptosystem and some improved RSA cryptosystems. Journal of Natural Science of Heilongjiang University 16(4), 15–18 (1999)
Beth, T.: Efficient zero-knowledge identification scheme for smart cards. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 77–84. Springer, Heidelberg (1988)
Gamal, E.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory 31(4), 469–472 (1985)
Guillou, L.C., Quisquater, J.-J.: A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 123–128. Springer, Heidelberg (1988)
Brandt, J., Damgard, I., Landrock, P., et al.: Zero knowledge scheme with secret key exchange. In: Proceedings on Advances in Cryptology, pp. 583–585 (1990)
Goldreich, O.: Foundations of crypto- graphy: basic tools, pp. 270–274. Cambridge University Press, New York (2001)
Binder, J., Bischof, H.-P.: Zero knowledge proofs of identity for ad hoc wireless networks (2003), http://www.cs.rit.edu/~jsb7384/zkp-survey.pdf
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computers and Security, pp. 83–91. ACM Press, New York (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, D., Liu, M., Yang, Z. (2004). A Method for Authenticating Based on ZKp in Distributed Environment. In: Cao, J., Yang, L.T., Guo, M., Lau, F. (eds) Parallel and Distributed Processing and Applications. ISPA 2004. Lecture Notes in Computer Science, vol 3358. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30566-8_85
Download citation
DOI: https://doi.org/10.1007/978-3-540-30566-8_85
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24128-7
Online ISBN: 978-3-540-30566-8
eBook Packages: Computer ScienceComputer Science (R0)