Approach to implementation of the accelerated zero knowledge identification of remote abonents

Authors

DOI:

https://doi.org/10.18372/2073-4751.85.21096

Keywords:

Zero-Knowledge Identification, cryptographically strong identification, modular exponentiation, open key cryptography

Abstract

The article proposes a method of accelerated zero knowledge identification, aimed at use in systems that interact with a large number of remote abonents. Reduction of the system identification time of a remote abonent is achieved due to the organization of an asymmetric computing load on the system and the abonent in the process of implementing the proposed procedure of cryptographically strong identification. 

Formalized procedures for abonent registration and identification before the start of a remote interaction session with the system have been developed. The work of the procedures is illustrated by examples.

It is theoretically proven and experimentally confirmed that the proposed approach allows to reduce the time of abonent identification by the system by 2-3 orders of magnitude compared to known methods of cryptographically strong identification.

References

Mu Han. Zero-knowledge identity authentication for internet of vehicles: Improvement and application. / Mu Han, Yin Zhikun, Chen Pengzhou, Zhang Xing, Ma Shidian.// PLoS ONE.- 2020.- Vol.15 –No.9.-P.217-247.

Schneier B. Applied Cryptography. Protocols. Algorithms and Source codes in C. Ed.John Wiley, 1996 - 758 pp.

Asimi Y. Strong zero-knowledge authentication based on the session keys (SASK) / Y.Asimi, А. Amghar, A. Asimi, Y. Sadgi // International Journal of Network Security & Its Applications (IJNSA).-2015.- Vol.7, - №.1,- P.51-66.

Bardis N. Fast subscriber identification based on the zero knowledge principle for multimedia content distribution / N.Bardis, N.Doukas, О. Markovskyi // International Journal of Multimedia Intelligence and Security.-2010.- №.4,- P. 363-377.

Feige U. Zero knowledge proofs of identity / U.Feige, A. Fiat, A.Shamir A.// Journal of Cryptology, - 1988.- Vol.1.- №.2 . – P.77-94.

Menezes Alfred, Handbook of Applied Cryptography. / Alfred Menezes, Paul C. van Oorschot, and Scott A. Vanstone // CRC Press. – 2001. – 780 p.

Guillou L.C. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memore / L.C.Guillou, J.J. Quisquater // Proceeding of Advances of Cryptology – Eurocrypt-88.- Springer-Verlag.- 1988.- P.123-128.

Верба О.А. Метод криптографічно строгої ідентифікації з блокуванням повторного використання паролів / О.А. Верба, І.В. Дайко // // Проблеми інформатизації та управління. - 2024.- № 2 (78).- С.4-13. DOI: 10.18372/2073-4751.78.18955

Schnorr C.P. Method for Identification Subscribers and for Generating and Verificating Electronic Signatures in data Exchange System.- US Patent #4995,083.19- 1991.

Markovskyi Oleksandr. Fast Zero-Knowledge Identification Method with Password Reuse Blocking / Oleksandr Markovskyi, Katerina Bojko, Spiros Kostoudas, Nikolas Bardis // 2024 14th International Conference on Dependable Systems, Services and Technologies (DESSERT), Athens, Greece, 2024, P. 142-146, DOI: 10.1109/DESSERT65323. 2024.11122142.

Марковський О. П. Використання алгебри полів Галуа для реалізації концепції нульових знань при ідентифікації та автентифікації віддалених користувачів /О.П.Марковський, Захаріудакіс Лефтеріс., В.Р.Максимук // Электронне моделювання. 2017.- № 6.- С.96-110.

Марковський О.П. Метод швидкого обчислення експоненти на полях Галуа GF(2n) для криптографічних застосувань /О.П. Марковський, С.С. Нікольський //. Комп’ютерно-інтегровані технології: освіта, наука, виробництво. Луцьк, 2025.- Вип. 58. – C. 188-196. DOI: 10.36910/6775-2524-0560-2925-58-23/

Bardis N.G. Identification Method Based on Block Ciphers / N.G. Bardis, N/ Doukas, O.P. Markovskyi // International Conference on Control, Artificial Intelligence, Robotics & Optimazation (ICCAIRO) . Praque, Czech Republic 20-22 May 2018.- IEEE.- 2018.- P. 307-311.

Aquilar C.. A new zero-knowledge code based identification scheme with reduced communication / С. Aquilar, Р. Gaborit, J. Schrec //. IEEE Information Theory Workshop 16-20 Oct. 2011 .-2011.-P.648-652. DOI: 10.1109/ITW.2011.6089577.

Santosh S. Venkatesh. Theory of Probability: Exploration and Applications. Cambridge University Press: 2012.- 827 p.

Published

2026-04-28

How to Cite

Markovsky, O., Daiko, I., & Grygorash , Y. V. (2026). Approach to implementation of the accelerated zero knowledge identification of remote abonents. Problems of Informatization and Control, 1(85). https://doi.org/10.18372/2073-4751.85.21096

Issue

Section

Статті