2019
DOI: 10.12928/telkomnika.v17i2.11754
|View full text |Cite
|
Sign up to set email alerts
|

Guillou-quisquater protocol for user authentication based on zero knowledge proof

Abstract: Authentication is the act of confirming the validity of someone's personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not secure, because the password can be sniffed. In addition, the server will keep the user's password for the authentication. This makes the system vulnerable when the database server is hacked. Zero knowledge authentication allows server to authenticate user without knowing the user's password. In this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
3
0
1
Order By: Relevance
“…The testing of the grade calculation website was carried out using Equation 1. The testing of cryptographic websites was carried out using CryptoJs library with three popular encryption methods, namely Advanced Encryption Standard (AES), Secure Hash Algorithms 384 (SHA384), and SHA512 [27,28]. The trial was conducted to determine whether the ForkJoinPool method implementation uses Web Workers technology in JavaScript as a data transformation library affecting the speed of data transformation.…”
Section: B Testing Resultsmentioning
confidence: 99%
“…The testing of the grade calculation website was carried out using Equation 1. The testing of cryptographic websites was carried out using CryptoJs library with three popular encryption methods, namely Advanced Encryption Standard (AES), Secure Hash Algorithms 384 (SHA384), and SHA512 [27,28]. The trial was conducted to determine whether the ForkJoinPool method implementation uses Web Workers technology in JavaScript as a data transformation library affecting the speed of data transformation.…”
Section: B Testing Resultsmentioning
confidence: 99%
“…In [10], a new authentication scheme based on the Fiat-Shamir protocol was developed for the exchange of confidential information in the Internet of Things technology. The works [11,12] show the application of the Feige-Fiat-Shamir authentication protocol for machine authentication in the integration of external networks and the Internet of vehicles (IoV). However, these protocols cannot be used in a friend or foe system for satellites since the identification process requires 20 to 40 times of authentication.…”
Section: Principles Of Constructing Modular Codesmentioning
confidence: 99%
“…В работах [6,7] представлен протокол аутентификации Гиллоу -Куискуотера, который также относится к протоколам с нулевым разглашением знаний. Проведем его модификацию в модулярном коде СОК.…”
Section: материалы и методы исследованияunclassified