AN EFFICIENT AUTHENTICATION PROTOCOL USING ZERO KNOWLEDGE PROPERTY AND PAIRING ON ELLIPTIC CURVES

Main Article Content

MANOJ KUMAR

Abstract

The systematic introduction to zero knowledge proof protocol has important theoretical guidance and practical significance on attracting more scholars involved in research as well as expanding application fields. Zero-knowledge proofs were first conceived in 1985 by Shafi Golwasser, Silvio Micalli and Charles Rackoff in a draft of the knowledge complexity of interactive proof systems. The goal of the present paper is to introduce a new identity based scheme which is a combination of zero-knowledge interactive proof and weil pairing on elliptic curves. The concept of weil pairing was first introduced by Andre Weil in 1940. It plays an important role in the theoretical study of the arithmetic of elliptic curves and Abelian varieties. It has also recently become extremely useful in cryptologic constructions related to these objects.

Downloads

Download data is not yet available.

Article Details

Section
Articles
Author Biography

MANOJ KUMAR, GURUKUL KANGRI VISHWAVIDYALAYA, HARIDWAR

DEPARTMENT OF MATHEMATICS AND STATISTICS, DESIGNATION-ASSISTANT PROFESSOR

References

Afreen R. and S.C. Mehrotra S. C., A review on elliptic curve

cryptography for embedded systems, International Journal of

Computer Science & Information Technology (IJCSIT), Vol. 3, No. 3,

-103, 2011. doi : 10.5121/ijcsit.2011.3307 84

Boneh D. and Franklin M., Identity-based Encryption from the weil-

pairing, SIAM J. of Computing, Vol. 3, No. 3, 586-615, 2003.

Cha J. C. and Cheon J. H., An identity based signature from gap

Diffie-Hellman groups, in Proceedings of International workshop on

Practice and teory in Public Key Cryptography-PKC, Springer-verlag,

-30, 2003.

Constantinescu N., Authentication protocol based on elliptic curve

cryptography, Anals of the University of Craiova, Mathematics and

Computer Science Series, Vol. 37(2), 83-91, 2010.

Fiat A. and Shamir A., How to prove yourself: practical solutions to

identification and signature problems. proceedings of crypto 86,

Santa Barbara 181-187, 1986.

Fiege U., Fiat A. and Shamir A., Zero knowledge proofs of identity.

Proc. of STOC, 1987.

Goldwasser S., Micali S. and Rackoff C., The Knowledge Complexity

of Interactive Proofs Systems. SIAM Journal on Computing, Vol. 18,

pages 186-208, 1989.Preliminary version in 17th ACM Symposium

on the theory of computing, 1985. Earlier version date to 1982.

Iyengar V. S., Novel elliptic curve scalar multiplication algorithm for

faster and safer public key cryptosystems, International Journal on

Cryptography and Information Security (IJCIS),Vol.2, No.3, 57-66,

doi:10.5121/ijcis.2012.2305 57

Joux A., A one round protocol for tripartite Diffie-Hellman, In

springer-verlag, Algorithm Number Theory Symposium, ANTS-IV,

Vol. 1838, Lecture notes in computer science, 385-394, 2000.

Joye M. and Neven G., Identity based cryptography, IOS Press,

Kar J., ID-based Deniable Authentication Protocol based

on Diffie-Hellman Problem on Elliptic Curve, International Journal of

Network Security, Vol.15, No.5, 357-364, 2013.

Koblitz N., Elliptic curve cryptosystems. Mathematics of

Computation 48, 203-209, 1987.

Kumar M., A secure and efficient authentication protocol based on

elliptic curve diffie-hellman algorithm and zero knowledge

property, I. J. S. C. E., Vol. 3, Issue-5, 137-142, 2013.

Massoud H. D. and Reza A., Zero-Knowledge Identification Scheme

Based on Weil Pairing. ISSN 1995-0802, Lobachevskii Journal of

Mathematics, Vol. 30, No. 3, pp. 203-207, 2007.

Miller V. S., The weil pairing and its efficient calculation, J.

Cryptography, 17:235-261, 2004.

Miller V. S., Uses of elliptic curves in cryptography. in: Advances in

Cryptology- Crypto’85, Lecture Notes in Computer Science, 218,

Springer-Verlag, Berlin, pp. 417-426, 1986.

Moody D., Peralta R., Perlner R., Regenscheid A., Roginsky A., and

Chen L., Report on Pairing-based Cryptography, Journal of

Research of the National Institute of Standards and Technology

, Vol. 120, 11-27, 2015.

http://dx.doi.org/10.6028/jres.120.002

Paterson K. G., ID based signature from pairings on elliptice

curves, Electron Lett. 38(18), 1025-1026, 2002.

Shamir A., Identity based cryptosystems and signature schemes,

in CRYPTO , 47-53, 1984.

Zhang F. and Kim K., ID based blind signature and ring signature

from pairings, in Advances in Cryptology-ASIACRYPT, springer-

verlag, 533-547, 2002.