2018
DOI: 10.14419/ijet.v7i2.6.10775
|View full text |Cite
|
Sign up to set email alerts
|

Effectiveness of the NIZKP Protocol for Authentication in IoT Environment

Abstract: Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of "Non-Interactive Zero Knowledge protocol" (NIZKP). This protocol involves two parties: The prover and the Ver… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 9 publications
(10 reference statements)
0
0
0
Order By: Relevance