Approach to implementation of the accelerated zero knowledge identification of remote abonents
DOI:
https://doi.org/10.18372/2073-4751.85.21096Keywords:
Zero-Knowledge Identification, cryptographically strong identification, modular exponentiation, open key cryptographyAbstract
The article proposes a method of accelerated zero knowledge identification, aimed at use in systems that interact with a large number of remote abonents. Reduction of the system identification time of a remote abonent is achieved due to the organization of an asymmetric computing load on the system and the abonent in the process of implementing the proposed procedure of cryptographically strong identification.
Formalized procedures for abonent registration and identification before the start of a remote interaction session with the system have been developed. The work of the procedures is illustrated by examples.
It is theoretically proven and experimentally confirmed that the proposed approach allows to reduce the time of abonent identification by the system by 2-3 orders of magnitude compared to known methods of cryptographically strong identification.
References
Mu Han. Zero-knowledge identity authentication for internet of vehicles: Improvement and application. / Mu Han, Yin Zhikun, Chen Pengzhou, Zhang Xing, Ma Shidian.// PLoS ONE.- 2020.- Vol.15 –No.9.-P.217-247.
Schneier B. Applied Cryptography. Protocols. Algorithms and Source codes in C. Ed.John Wiley, 1996 - 758 pp.
Asimi Y. Strong zero-knowledge authentication based on the session keys (SASK) / Y.Asimi, А. Amghar, A. Asimi, Y. Sadgi // International Journal of Network Security & Its Applications (IJNSA).-2015.- Vol.7, - №.1,- P.51-66.
Bardis N. Fast subscriber identification based on the zero knowledge principle for multimedia content distribution / N.Bardis, N.Doukas, О. Markovskyi // International Journal of Multimedia Intelligence and Security.-2010.- №.4,- P. 363-377.
Feige U. Zero knowledge proofs of identity / U.Feige, A. Fiat, A.Shamir A.// Journal of Cryptology, - 1988.- Vol.1.- №.2 . – P.77-94.
Menezes Alfred, Handbook of Applied Cryptography. / Alfred Menezes, Paul C. van Oorschot, and Scott A. Vanstone // CRC Press. – 2001. – 780 p.
Guillou L.C. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memore / L.C.Guillou, J.J. Quisquater // Proceeding of Advances of Cryptology – Eurocrypt-88.- Springer-Verlag.- 1988.- P.123-128.
Верба О.А. Метод криптографічно строгої ідентифікації з блокуванням повторного використання паролів / О.А. Верба, І.В. Дайко // // Проблеми інформатизації та управління. - 2024.- № 2 (78).- С.4-13. DOI: 10.18372/2073-4751.78.18955
Schnorr C.P. Method for Identification Subscribers and for Generating and Verificating Electronic Signatures in data Exchange System.- US Patent #4995,083.19- 1991.
Markovskyi Oleksandr. Fast Zero-Knowledge Identification Method with Password Reuse Blocking / Oleksandr Markovskyi, Katerina Bojko, Spiros Kostoudas, Nikolas Bardis // 2024 14th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, 2024, P. 142-146, DOI: 10.1109/DESSERT65323. 2024.11122142.
Марковський О. П. Використання алгебри полів Галуа для реалізації концепції нульових знань при ідентифікації та автентифікації віддалених користувачів /О.П.Марковський, Захаріудакіс Лефтеріс., В.Р.Максимук // Электронне моделювання. 2017.- № 6.- С.96-110.
Марковський О.П. Метод швидкого обчислення експоненти на полях Галуа GF(2n) для криптографічних застосувань /О.П. Марковський, С.С. Нікольський //. Комп’ютерно-інтегровані технології: освіта, наука, виробництво. Луцьк, 2025.- Вип. 58. – C. 188-196. DOI: 10.36910/6775-2524-0560-2925-58-23/
Bardis N.G. Identification Method Based on Block Ciphers / N.G. Bardis, N/ Doukas, O.P. Markovskyi // International Conference on Control, Artificial Intelligence, Robotics & Optimazation (ICCAIRO) . Praque, Czech Republic 20-22 May 2018.- IEEE.- 2018.- P. 307-311.
Aquilar C.. A new zero-knowledge code based identification scheme with reduced communication / С. Aquilar, Р. Gaborit, J. Schrec //. IEEE Information Theory Workshop 16-20 Oct. 2011 .-2011.-P.648-652. DOI: 10.1109/ITW.2011.6089577.
Santosh S. Venkatesh. Theory of Probability: Exploration and Applications. Cambridge University Press: 2012.- 827 p.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.