Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Knowledge-proof based versatile smart card verification protocol

Published: 01 July 2000 Publication History

Abstract

We propose a zero-knowledge interactive proof based identification and signature scheme. The protocol is based on Euler's totient function and discrete logarithms over the ring Z/nZ, and can be applied to smart cards. A prover keeps a signed subgroup generator provided by a trusted center as its secret information. Our scheme has symmetricity in the sense that the same computational complexity and the same hardware both for Prover and for Verifier are required. Also, it requires minimal amount of computation and communications for secret information. The protocol is versatile enough to be applicable to digital signature scheme, multiple digital signature scheme and key exchange protocol. We outline those protocols to show the versatility of our protocol.

Cited By

View all
  • (2018)An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)Mathematical and Computational Applications10.3390/mca2302001723:2(17)Online publication date: 21-Mar-2018
  • (2016)SPA: A Secure and Private Auction Framework for Decentralized Online Social NetworksIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2015.249400927:8(2394-2407)Online publication date: 13-Jul-2016
  • (2014)LocaWardIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2013.15225:2(343-352)Online publication date: 1-Feb-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 30, Issue 3
July 2000
51 pages
ISSN:0146-4833
DOI:10.1145/382179
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 2000
Published in SIGCOMM-CCR Volume 30, Issue 3

Check for updates

Author Tags

  1. cryptography
  2. digital signature
  3. identification
  4. key exchange
  5. multiple signature
  6. smart card
  7. zero-knowledge interactive proof

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)41
  • Downloads (Last 6 weeks)6
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs)Mathematical and Computational Applications10.3390/mca2302001723:2(17)Online publication date: 21-Mar-2018
  • (2016)SPA: A Secure and Private Auction Framework for Decentralized Online Social NetworksIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2015.249400927:8(2394-2407)Online publication date: 13-Jul-2016
  • (2014)LocaWardIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2013.15225:2(343-352)Online publication date: 1-Feb-2014
  • (2012)An Efficient and Provably-secure Digital signature Scheme based on Elliptic Curve Bilinear PairingsTheoretical and Applied Informatics10.2478/v10179-012-0009-024:2Online publication date: 1-Jan-2012
  • (2010)Electronic seal system based on RSA algorithm and public-key infrastructure2010 International Conference on Networking and Digital Society10.1109/ICNDS.2010.5479289(636-639)Online publication date: May-2010
  • (2010)Study of an electronic seal system based on elliptic curve cryptography and public-key infrastructure2010 2nd International Conference on Future Computer and Communication10.1109/ICFCC.2010.5497613(V2-760-V2-763)Online publication date: May-2010
  • (2009)A Zero-Knowledge Identity Verification Protocol Using Blind WatermarkProceedings of the 2009 International Conference on Computer Engineering and Technology - Volume 0210.1109/ICCET.2009.85(496-498)Online publication date: 22-Jan-2009
  • (2008)Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve CryptosystemProceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications - Volume 0310.1109/ISDA.2008.8(3-5)Online publication date: 26-Nov-2008
  • (2007)Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols2007 IEEE International Parallel and Distributed Processing Symposium10.1109/IPDPS.2007.370284(1-10)Online publication date: Mar-2007
  • (2007)ID-based digital signature scheme on the elliptic curve cryptosystemComputer Standards & Interfaces10.1016/j.csi.2007.01.00429:6(601-604)Online publication date: Sep-2007
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media