2015
DOI: 10.11591/ijece.v5i6.pp1468-1471
|View full text |Cite
|
Sign up to set email alerts
|

Password Authentication for multicast host using zero knowledge Proof

Abstract: <p>The password which is a more secure and valuable data should be highly protected from eavesdropper. This paper presents how password required for authentication of members of group communication is securely delivered by the source or initiator of the group. The password delivery uses zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption. The password delivered is a One Time Password which can be used for certain amount of time in order to ensure a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Thus, the malicious prover is incapable of forging information possessed by the prover P and is also incapable of forging proof of knowledge of that information. After N iterations of the ZKP algorithm, the malicious prover has only a probability of 2-Nk of providing knowledge or proof of knowledge for a k-bit vector known as the prover P [54].…”
Section: Preliminariesmentioning
confidence: 99%
“…Thus, the malicious prover is incapable of forging information possessed by the prover P and is also incapable of forging proof of knowledge of that information. After N iterations of the ZKP algorithm, the malicious prover has only a probability of 2-Nk of providing knowledge or proof of knowledge for a k-bit vector known as the prover P [54].…”
Section: Preliminariesmentioning
confidence: 99%
“…Zero Knowledge Proof (ZKP) makes a prover able to prove its identity to the verifier using a password without allowing anyone to learn anything about the password [12]. In authentication and digital signatures, it is very important to prove the user identification without revealing the user information [13].…”
Section: Introductionmentioning
confidence: 99%
“…Most computer systems, Internet-based environments, and networks use password authentication [3]. Once a Password (PW) or One Time Password (OTP) which is valid for the only certain amount of time or one session [4] has been entered, the system looks up it in the password hash. If the stored password matches the entered password for the specified username, the user is authenticated in that system.…”
Section: Introductionmentioning
confidence: 99%