O.P. Markovskiy, Zacharioudakis Leftherios, V.R. Maksymuk
Èlektron. model. 2017, 39(6):33-46
The new approach is proposed to implementation of theoretically strict identification and authentication of remote users in accordance with zero-knowledge conception. The proposed approach consists in the use of irreversible transformations of the Galois field algebra. This allows us to speed up the process of user identification process both under software and hardware implementation. The cyclic properties of special class Galois field exponentiation have been investigated. Based on those properties the procedures of user registration and user identification procedures have been developed. A numerical example for designed procedures is given. It is shown, both theoretically and experimentally that the proposed approach provides for acceleration of user authentication process by 1-2 orders of magnitude, via a hardware implementation.
zero-knowledge conception, remote users identification, authentication of users, irreversible transformation on Galois fields.
1. Schneier, B. (1996), Applied cryptography. Protocols. Algorithms and source codes in C., Ed. John Wiley, NY, USA.
2. Stavroulakis, P. (2011), “Efficient zero-knowledge identification based on one way Boolean transformations”, IEEE of GLOBECOM Workshops, Houston, Texas, USA, December 5-9, 2011, pð. 275-280.
3. Feige, U., Fiat, A. and Shamir, A. (1988), “Zero knowledge proofs of identity”, Journal of Cryptology, Vol. 1, no. 2, pp. 77-94.
4. Mukhin, V.E., Zacharioudakis Leftherios, Gerasimenko, O.Yu. and Kozeratskiy, M.S. (2017), “Method of zero-knowledge identification of remote users based on the conception of “zero knowledge”, Telecommunikatsiyni ta informatsiyni tekhnologii, Vol. 54, no. 1, pp. 37-45.
5. Nikolaychuk, Ya.M. (2012), Kody polya Galua: teoriya ta zastosuvannya [Galois field codes: theory and applications], TzOV Ternograf, Ternopil, Ukraine.
6. Markovskyy, O., Bardis, N. and Doukas, N. (2010), “Fast subscriber identification based on the zero knowledge principle for multimedia content distribution”, International Journal of Multimedia Intelligence and Security, no. 1, pp. 78-82.