[PDF][PDF] A secure and efficient authentication protocol based on elliptic curve diffie-hellman algorithm and zero knowledge property

M Kumar - International Journal of Soft Computing and …, 2013 - Citeseer
… for authentication and key agreement. The present paper consists of an introduction to
elliptic curves and an authentication protocol based on ECC and zero knowledge property. The …

Secure and efficient two-factor zero-knowledge authentication solution for access control systems

L Malina, P Dzurenda, J Hajny, Z Martinasek - Computers & Security, 2018 - Elsevier
… In this paper, we present a secure and efficient two-factor authentication protocol … Our protocol
is based on a zero-knowledge approach, and it is … properties. In our paper, we present an …

[PDF][PDF] A secure zero knowledge authentication protocol for wireless (mobile) ad-hoc networks

A Chaturvedi, N Srivastava, V Shukla… - International journal of …, 2015 - academia.edu
… This paper provides an authenticated zero knowledge protocol which is … goals such as
authentication, data integrity etc [13]. … called implicit key authentication) is the property in which …

An efficient authentication protocol using zero knowledge property and pairing on elliptic curves.

M Kumar - International Journal of Advanced Research in …, 2017 - search.ebscohost.com
properties, security and performance. In the present paper we proposed a new zero knowledge
… In section five we compare the efficiency of our scheme with Massoud et al [14] scheme. …

Adaptive group-based zero knowledge proof-authentication protocol in vehicular ad hoc networks

AA Rasheed, RN Mahapatra… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… PRELIMINARIES The proposed authentication protocol in this paper is based on the ZKP …
[31] into the authentication protocol framework. Our authentication scheme is tailored with a …

An authentication protocol based on chaos and zero knowledge proof

W Major, WJ Buchanan, J Ahmad - Nonlinear Dynamics, 2020 - Springer
Zero knowledge proofs harness difficult mathematical problems to provide security against
information leakage from the proof—the ‘zero knowledgeproperty. … Zero knowledge protocols

Zero-knowledge authentication protocol based on alternative mode in RFID systems

H Liu, H Ning - IEEE Sensors Journal, 2011 - ieeexplore.ieee.org
… a lightweight Zero-Knowledge Authentication Protocol (ZKAP) … In ZKAP, dual zero-knowledge
proofs are randomly chosen … A zero-knowledge proof protocol has zeroknowledge property

A survey on zero-knowledge authentication for internet of things

Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
… Next, we overview zero-knowledge authentication and provide a … We describe a basic
ZKP-based authentication protocol … is that ZKP has the property of zero knowledge. In traditional …

Zero knowledge password authentication protocol

N Datta - New Paradigms in Internet Computing, 2013 - Springer
… In many applications, the password is sent as cleartext to the server to be authenticated thus
protocol based on zero knowledge proof by which the user can prove to the authentication

Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare

GS Gaba, M Hedabou, P Kumar, A Braeken… - Sustainable Cities and …, 2022 - Elsevier
… AVISPA is a security analyzer used by researchers working on security and authentication
protocols to perform formal security analysis. AVISPA offers four backends, namely, on-the-fly …