AN EFFICIENT AUTHENTICATION PROTOCOL USING ZERO KNOWLEDGE PROPERTY AND PAIRING ON ELLIPTIC CURVES
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Afreen R. and S.C. Mehrotra S. C., A review on elliptic curve
cryptography for embedded systems, International Journal of
Computer Science & Information Technology (IJCSIT), Vol. 3, No. 3,
-103, 2011. doi : 10.5121/ijcsit.2011.3307 84
Boneh D. and Franklin M., Identity-based Encryption from the weil-
pairing, SIAM J. of Computing, Vol. 3, No. 3, 586-615, 2003.
Cha J. C. and Cheon J. H., An identity based signature from gap
Diffie-Hellman groups, in Proceedings of International workshop on
Practice and teory in Public Key Cryptography-PKC, Springer-verlag,
-30, 2003.
Constantinescu N., Authentication protocol based on elliptic curve
cryptography, Anals of the University of Craiova, Mathematics and
Computer Science Series, Vol. 37(2), 83-91, 2010.
Fiat A. and Shamir A., How to prove yourself: practical solutions to
identification and signature problems. proceedings of crypto 86,
Santa Barbara 181-187, 1986.
Fiege U., Fiat A. and Shamir A., Zero knowledge proofs of identity.
Proc. of STOC, 1987.
Goldwasser S., Micali S. and Rackoff C., The Knowledge Complexity
of Interactive Proofs Systems. SIAM Journal on Computing, Vol. 18,
pages 186-208, 1989.Preliminary version in 17th ACM Symposium
on the theory of computing, 1985. Earlier version date to 1982.
Iyengar V. S., Novel elliptic curve scalar multiplication algorithm for
faster and safer public key cryptosystems, International Journal on
Cryptography and Information Security (IJCIS),Vol.2, No.3, 57-66,
doi:10.5121/ijcis.2012.2305 57
Joux A., A one round protocol for tripartite Diffie-Hellman, In
springer-verlag, Algorithm Number Theory Symposium, ANTS-IV,
Vol. 1838, Lecture notes in computer science, 385-394, 2000.
Joye M. and Neven G., Identity based cryptography, IOS Press,
Kar J., ID-based Deniable Authentication Protocol based
on Diffie-Hellman Problem on Elliptic Curve, International Journal of
Network Security, Vol.15, No.5, 357-364, 2013.
Koblitz N., Elliptic curve cryptosystems. Mathematics of
Computation 48, 203-209, 1987.
Kumar M., A secure and efficient authentication protocol based on
elliptic curve diffie-hellman algorithm and zero knowledge
property, I. J. S. C. E., Vol. 3, Issue-5, 137-142, 2013.
Massoud H. D. and Reza A., Zero-Knowledge Identification Scheme
Based on Weil Pairing. ISSN 1995-0802, Lobachevskii Journal of
Mathematics, Vol. 30, No. 3, pp. 203-207, 2007.
Miller V. S., The weil pairing and its efficient calculation, J.
Cryptography, 17:235-261, 2004.
Miller V. S., Uses of elliptic curves in cryptography. in: Advances in
Cryptology- Crypto’85, Lecture Notes in Computer Science, 218,
Springer-Verlag, Berlin, pp. 417-426, 1986.
Moody D., Peralta R., Perlner R., Regenscheid A., Roginsky A., and
Chen L., Report on Pairing-based Cryptography, Journal of
Research of the National Institute of Standards and Technology
, Vol. 120, 11-27, 2015.
http://dx.doi.org/10.6028/jres.120.002
Paterson K. G., ID based signature from pairings on elliptice
curves, Electron Lett. 38(18), 1025-1026, 2002.
Shamir A., Identity based cryptosystems and signature schemes,
in CRYPTO , 47-53, 1984.
Zhang F. and Kim K., ID based blind signature and ring signature
from pairings, in Advances in Cryptology-ASIACRYPT, springer-
verlag, 533-547, 2002.