Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy
{"title":"用于安全物联网和区块链环境的多轮零知识证明算法","authors":"Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy","doi":"10.18280/ijsse.130408","DOIUrl":null,"url":null,"abstract":"Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments\",\"authors\":\"Deebakkarthi Chinnasame Rani, Sai Ganesh Janakiraman, Kommula Serath Chandra, Elambharathi Padmavathi Thangavel, Ganga Abhirup Kothamasu, Krithika Latha Bhaskaran, Guruprakash Jayabalasamy\",\"doi\":\"10.18280/ijsse.130408\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.\",\"PeriodicalId\":37802,\"journal\":{\"name\":\"International Journal of Safety and Security Engineering\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Safety and Security Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18280/ijsse.130408\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Safety and Security Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18280/ijsse.130408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
A Multi-Round Zero Knowledge Proof Algorithm for Secure IoT and Blockchain Environments
Presented herein is a novel algorithm for multi-round, zero-knowledge proof (ZKP), devised specifically for authenticating factorisation proofs within a variety of cryptographic applications. This advanced algorithm, while maintaining computational complexity within acceptable bounds, offers a secure and proficient solution. The functionality of the algorithm is marked by multiple rounds of interaction between the Prover and Verifier. Initially, the Prover generates a random value and calculates a commitment. Subsequently, the Verifier issues a random challenge, eliciting a computed response from the Prover. To validate the proof, the Verifier verifies the equality of the commitment and the computed response. Efficaciousness of the proposed multi-round ZKP algorithm is demonstrated across diverse input sizes and parameters. Results indicate a success rate exceeding 90% on average, showcasing the robustness of the method. The recurring interaction between the Verifier and Prover enhances the Prover's authentication, thereby improving the algorithm’s reliability. Implementation of the algorithm, achievable through standard cryptographic tools and protocols, can fortify the security of multiple cryptographic applications. A significant application can be found in Digital Identity Management Systems (DIMS). Currently, these systems are vulnerable to a myriad of threats, including identity spoofing, data breaches, and internal security risks. The application of the ZKP algorithm can simultaneously augment security and withhold sensitive information, potentially transforming the DIMS security landscape. Future research may focus on improving the efficiency and scalability of the multi-round ZKP algorithm. There also remains a vast potential for exploring additional applications of this technique within various cryptographic domains.
期刊介绍:
The International Journal of Safety and Security Engineering aims to provide a forum for the publication of papers on the most recent developments in the theoretical and practical aspects of these important fields. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and applications that brings together in a systematic way many disciplines of engineering, from the traditional to the most technologically advanced. The Journal covers areas such as crisis management; security engineering; natural disasters and emergencies; terrorism; IT security; man-made hazards; risk management; control; protection and mitigation issues. The Journal aims to attract papers in all related fields, in addition to those listed under the List of Topics, as well as case studies describing practical experiences. The study of multifactor risk impact will be given special emphasis. Due to the multitude and variety of topics included, the List is only indicative of the themes of the expected papers. Authors are encouraged to submit papers in all areas of Safety and Security, with particular attention to integrated and interdisciplinary aspects.