Zero-Knowledge Proof Based Authentication Over Untrusted Networks
Cherukupalli Veda Vyasa Aditya1, Rajesh Kannan Megalingam2

1Cherukupalli Veda Vyasa Aditya, Department of Cyber Security Systems and Networks, Amrita Vishwa Vidyapeetham University, Amritapuri Campus, Kollam, India.
2Dr. Rajesh Kannan Megalingam, Assistant Professor, Department of ECE, Amrita School of Engineering, Amrita Vishwa Vidyapeetham University, Amritapuri Campus, Kollam, India.
Manuscript received on June 19, 2020. | Revised Manuscript received on June 25, 2020. | Manuscript published on July 10, 2020. | PP: 238-241 | Volume-9 Issue-9, July 2020 | Retrieval Number: 100.1/ijitee.I6917079920 | DOI: 10.35940/ijitee.I6917.079920
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Zero knowledge proof is a powerful cryptographic protocol that is utilized to establish data security whilst ensuring and maintaining user anonymity. ZKP has relatively less complex computational requirements as compared to the other protocols for authentication. Conventional authentication schemes are susceptible to attacks such as MiTM, IP spoofing, DoS, replay and other eavesdropping based attacks, when the data is shared across an untrusted network. This paper shows an approach to ensure authentication of a device over an untrusted network whilst maintaining and safeguarding user credentials, by using the concepts of ZKP protocol. 
Keywords: Zero-Knowledge proof, Cryptography, authentication, XOR, Untrusted networks.
Scope of the Article: Authentication