A zero-knowledge identification scheme based on the discrete logarithm problem and elliptic curves

S Ezziri, O Khadir - Advances on Smart and Soft Computing: Proceedings …, 2021 - Springer
In cryptography, zero-knowledge proof has become frequently used in several types of
transactions, for example, the authorization to access a server, the communication between …

Variant of Guillou-Quisquater zero-knowledge scheme

S Ezziri, O Khadir - Int. J. Open Problems Compt. Math, 2018 - platform.almanhal.com
In cryptography, a zero-knowledge proof is the process allowing Alice, the customer or the
client to prove herself to Bob, a bank or a server. Without obtaining any secret information …

Study of Zero-Knowledge protocols and Elliptic Curve Cryptography and their implementation in Smart Card environments using Java Card

CAA Serna - arXiv preprint arXiv:2308.16666, 2023 - arxiv.org
This paper studies the problem of Zero-Knowledge Protocol (ZKP) and elliptic curve
cryptographic implementation in a computationally limited environment, such as, the smart …

Security aspects of zero knowledge identification schemes

AM Panait - 2008 - escholarship.mcgill.ca
In this thesis we follow two directions: Zero Knowledge Protocols and the Discrete Logarithm
Problem. In each direction we present the necessary background and we give a new …

Zero-knowledge proofs of identity based on ELGAMAL on conic

D Zhang, M Liu, Z Yang - IEEE International Conference on E …, 2004 - ieeexplore.ieee.org
A protocol for zero-knowledge proofs of identity based on ElGamal on conic is proposed in
this paper. The solution to a hard puzzle is divided into two parts, and the P (prover) …

Nonlinearities in elliptic curve authentication

R Alsaedi, N Constantinescu, V Rădulescu - Entropy, 2014 - mdpi.com
In order to construct the border solutions for nonsupersingular elliptic curve equations, some
common used models need to be adapted from linear treated cases for use in particular …

A zero-knowledge identification protocol in the ring of Gaussian integers

M Rao Valluri - Journal of Discrete Mathematical Sciences and …, 2016 - Taylor & Francis
In this paper, a zero-knowledge identification protocol is proposed by extending from the
rational of natural integers ℤ, to the ring of Gaussian integers ℤ [i]. Its security relies on the …

Zero-knowledge identification scheme based on Weil pairing

MH Dehkordi, R Alimoradi - Lobachevskii Journal of Mathematics, 2009 - Springer
Zero knowledge turned out to be a useful tool for many cryptographic applications. Many
cryptographic protocols based on bilinear pairings, namely the Weil and Tate pairings, have …

Cryptanalysis of a zero-knowledge identification protocol of eurocrypt '95

JS Coron, D Naccache - Topics in Cryptology–CT-RSA 2004: The …, 2004 - Springer
LNCS 2964 - Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt ‘95
Page 1 Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt ’95 Jean-Sébastien …

[PDF][PDF] Effectiveness of the NIZKP protocol for authentication in IoT environment

TYC Lawson, T Senthilnathan - International Journal of Engineering …, 2018 - academia.edu
Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an
equivalent security, smaller key sizes, less power consumption, faster calculations, less …