用于安全物联网和区块链环境的多轮零知识证明算法

Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy
{"title":"用于安全物联网和区块链环境的多轮零知识证明算法","authors":"Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy","doi":"10.18280/ijsse.130408","DOIUrl":null,"url":null,"abstract":"Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments\",\"authors\":\"Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy\",\"doi\":\"10.18280/ijsse.130408\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.\",\"PeriodicalId\":37802,\"journal\":{\"name\":\"International Journal of Safety and Security Engineering\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Safety and Security Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18280/ijsse.130408\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Safety and Security Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18280/ijsse.130408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

本文提出了一种用于多轮零知识证明(ZKP)的新算法,专门用于各种密码学应用中的认证分解证明。这种先进的算法在将计算复杂度保持在可接受范围内的同时,提供了一种安全而熟练的解决方案。该算法的功能由证明者和验证者之间的多轮交互来标记。最初,证明程序生成一个随机值并计算承诺。随后,验证者发出随机挑战,从证明者那里得到计算后的响应。为了验证证明,验证者验证承诺和计算响应是否相等。在不同的输入大小和参数下,证明了所提出的多轮ZKP算法的有效性。结果表明,平均成功率超过90%,显示了该方法的鲁棒性。验证者和证明者之间的重复交互增强了证明者的身份验证,从而提高了算法的可靠性。该算法的实现可以通过标准的加密工具和协议来实现,可以加强多种加密应用的安全性。在数字身份管理系统(DIMS)中可以找到一个重要的应用。目前,这些系统容易受到各种威胁的攻击,包括身份欺骗、数据泄露和内部安全风险。ZKP算法的应用可以同时增强安全性和保留敏感信息,潜在地改变DIMS的安全环境。未来的研究可以集中在提高多轮ZKP算法的效率和可扩展性上。在各种加密领域中探索这种技术的其他应用仍然有很大的潜力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments
Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Safety and Security Engineering
International Journal of Safety and Security Engineering Environmental Science-Environmental Science (all)
CiteScore
2.80
自引率
0.00%
发文量
64
期刊介绍: The International Journal of Safety and Security Engineering aims to provide a forum for the publication of papers on the most recent developments in the theoretical and practical aspects of these important fields. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and applications that brings together in a systematic way many disciplines of engineering, from the traditional to the most technologically advanced. The Journal covers areas such as crisis management; security engineering; natural disasters and emergencies; terrorism; IT security; man-made hazards; risk management; control; protection and mitigation issues. The Journal aims to attract papers in all related fields, in addition to those listed under the List of Topics, as well as case studies describing practical experiences. The study of multifactor risk impact will be given special emphasis. Due to the multitude and variety of topics included, the List is only indicative of the themes of the expected papers. Authors are encouraged to submit papers in all areas of Safety and Security, with particular attention to integrated and interdisciplinary aspects.
期刊最新文献
Safe Work and Personal Protective Equipment in an Economic Context Navigating Human Factors in Maritime Safety: A Review of Risks and Improvements in Engine Rooms of Ocean-Going Vessels Quantitative Analysis of Global Research Trends in Crowd Management for Tawaf: A Bibliometric Study (1997–2023) Evaluating Performances of Two Unsupervised Methods for ‎Classification Crime Text Spurious Trip Rate Optimization Using Particle Swarm Optimization Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1