Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Web Authentication Protocol Using Zero Knowledge Proof

Published: 01 January 2011 Publication History
  • Get Citation Alerts
  • Abstract

    Market research surveys report that 75% of hacks occur at the application layer. Of the multiple vulnerabilities that exist in Web application software, proper authentication of the client and the server to each other is fundamental to the security of the system. In the current scenario, we manage this with the adoption of password-based client authentication and PKI-based server authentication. There exist unresolved vulnerabilities in this system due to the misuse of the client's passwords (impersonation) by those managing the servers. The clients' trust of the server based on the certificates issued by an increasing number of certification authorities is questionable in terms of validity and freshness. For proper authentication in Web applications, we need to verify two conditions: 1) the binding of the identity of the entity with the publicly known name or key and 2) the entity does possess the corresponding private key for the identified public key. In this paper, we use the elliptic curve discrete log problem-based version of classical zero knowledge protocol for proving number 2 and modifications of the existing schemes for proving number 1. We have done a prototype implementation of the solution and security analysis required to satisfy the security objectives.

    Cited By

    View all
    • (2021)Hierarchical Software Design Methodology for High Concurrency and Fine-Grained Permission Control ScenariosProceedings of the 2021 2nd International Conference on Control, Robotics and Intelligent System10.1145/3483845.3483867(122-128)Online publication date: 20-Aug-2021

    Index Terms

    1. Web Authentication Protocol Using Zero Knowledge Proof
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Information Security Journal: A Global Perspective
        Information Security Journal: A Global Perspective  Volume 20, Issue 2
        January 2011
        57 pages
        ISSN:1939-3555
        EISSN:1939-3547
        Issue’s Table of Contents

        Publisher

        Taylor & Francis, Inc.

        United States

        Publication History

        Published: 01 January 2011

        Author Tags

        1. PKI alternatives
        2. ZKP
        3. client server authentication

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 27 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2021)Hierarchical Software Design Methodology for High Concurrency and Fine-Grained Permission Control ScenariosProceedings of the 2021 2nd International Conference on Control, Robotics and Intelligent System10.1145/3483845.3483867(122-128)Online publication date: 20-Aug-2021

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media