Zero-knowledge proof authentication protocols
Izvestiya of Saratov University. Mathematics. Mechanics. Informatics, Tome 19 (2019) no. 1, pp. 114-121.

Voir la notice de l'article provenant de la source Math-Net.Ru

The paper presented the comparative analysis of the authentication Shnorr's protocol and the authentication protocol based on the task of finding a Hamilton cycle in the graph. It is shown that with the use of CUDA technology the productivity of protocols on graphs is as high as Shnorr's protocol productivity. The importance of such research is that protocols on graphs (the authentication protocol on the basis of the proof of graph isomorphism, the authentication protocol based on the task of finding a Hamilton cycle in the graph, etc.) have the property of zero-knowledge proof. These protocols are based on $NP$ complete tasks therefore they are independent of quantum computings, namely, are resistant to the quantum attacks. Also the modified algorithms of two-step authentication protocols with zero-knowledge proof based on asymmetric ciphers with the use of elliptic curves are also given.
@article{ISU_2019_19_1_a9,
     author = {S. M. Ratseev and M. A. Rostov},
     title = {Zero-knowledge proof authentication protocols},
     journal = {Izvestiya of Saratov University. Mathematics. Mechanics. Informatics},
     pages = {114--121},
     publisher = {mathdoc},
     volume = {19},
     number = {1},
     year = {2019},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/ISU_2019_19_1_a9/}
}
TY  - JOUR
AU  - S. M. Ratseev
AU  - M. A. Rostov
TI  - Zero-knowledge proof authentication protocols
JO  - Izvestiya of Saratov University. Mathematics. Mechanics. Informatics
PY  - 2019
SP  - 114
EP  - 121
VL  - 19
IS  - 1
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/ISU_2019_19_1_a9/
LA  - ru
ID  - ISU_2019_19_1_a9
ER  - 
%0 Journal Article
%A S. M. Ratseev
%A M. A. Rostov
%T Zero-knowledge proof authentication protocols
%J Izvestiya of Saratov University. Mathematics. Mechanics. Informatics
%D 2019
%P 114-121
%V 19
%N 1
%I mathdoc
%U http://geodesic.mathdoc.fr/item/ISU_2019_19_1_a9/
%G ru
%F ISU_2019_19_1_a9
S. M. Ratseev; M. A. Rostov. Zero-knowledge proof authentication protocols. Izvestiya of Saratov University. Mathematics. Mechanics. Informatics, Tome 19 (2019) no. 1, pp. 114-121. http://geodesic.mathdoc.fr/item/ISU_2019_19_1_a9/

[1] Cheremushkin A. V., Cryptographic Protocols. Basic Properties and Vulnerability, IC “Akademiya”, M., 2009, 272 pp. (in Russian)

[2] Moldovyan A. A., Moldovyan D. N., Levina A. B., Authentication protocols with zero-knowledge proof, ITMO Univ., St. Petersburg, 2016, 55 pp. (in Russian)

[3] Schnorr C. P., “Efficient Identification and Signatures for Smart Cards”, Advances in Cryptology – CRYPTO'89. Proceedings., CRYPTO 1989, Lecture Notes in Computer Science, 435, Springer, N. Y., 1990, 239–252 | DOI | MR

[4] Hankerson D., Menezes A., Vanstone S., Guide to Elliptic Curve Cryptography, Springer-Verlag, N. Y., 2004, 358 pp. | DOI | MR | Zbl

[5] An Elliptic Curve Cryptography (ECC) Primer: why ECC is the next generation of public key cryptography, The Certicom Corp. 'Catch the Curve' White Paper Series, June 2004, 24 pp. (accessed 05 September 2017) https://www.certicom.com/content/dam/certicom/images/pdfs/WP-ECCprimer.pdf

[6] Ratseev S. M., Rostov M. A., “Methods of an acceleration and enhancement of the cryptography authentication protocol with zero disclosure of knowledge on the basis of the task about finding of a hamilton cycle in the graph”, Belgorod State University Scientific Bulletin. Economics. Computer Science, 16(265):43 (2017), 131–137 (in Russian)

[7] Stone J. E., Phillips J. C., Freddolino P. L., Hardy D. J., Trabuco L. G., Schulten K., “Accelerating molecular modeling applications with graphics processors”, J. Comput. Chem., 28:16 (2007), 2618–2640 | DOI

[8] Van Meel J. A., Arnold A., Frenkel D., Zwart S. P., Belleman R., “Harvesting graphics power for MD simulations”, Molecular Simulation, 34:3 (2008), 259–266 | DOI

[9] Harris C., Haines K., Staveley-Smith L., “GPU accelerated radio astronomy signal convolution”, Exp. Astron., 22:1–2 (2008), 129–141 | DOI

[10] Muyan-Ozcelik P., Owens J. D., Xia J., Samant S. S., “Fast deformable registration on the GPU: A CUDA implementation of demons”, Proc. Int. Conf. Computational Science and its Applications (Perugia, Italy, 2008), 223–233 | DOI

[11] ISO/IEC 9798-5:2009(E): Information technology – Security techniques – Entity authentication – Part 5: Mechanisms using zero-knowledge technique, 2009 (accessed 05 September 2018) https://www.iso.org/standard/50456.html