Zero-Knowledge Proof Based Authentication Over Untrusted Networks

  • Aditya* C
  • et al.
N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Zero knowledge proof is a powerful cryptographic protocol that is utilized to establish data security whilst ensuring and maintaining user anonymity. ZKP has relatively less complex computational requirements as compared to the other protocols for authentication. Conventional authentication schemes are susceptible to attacks such as MiTM, IP spoofing, DoS, replay and other eavesdropping based attacks, when the data is shared across an untrusted network. This paper shows an approach to ensure authentication of a device over an untrusted network whilst maintaining and safeguarding user credentials, by using the concepts of ZKP protocol.

Cite

CITATION STYLE

APA

Aditya*, C. V. V., & Megalingam, Dr. R. K. (2020). Zero-Knowledge Proof Based Authentication Over Untrusted Networks. International Journal of Innovative Technology and Exploring Engineering, 9(9), 238–241. https://doi.org/10.35940/ijitee.i6917.079920

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free