What is it about?

The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible.

Featured Image

Why is it important?

Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system.

Read the Original

This page is a summary of: Intrusion Detection in Zero Knowledge System Using Model Checking Approach, January 2013, Springer Science + Business Media,
DOI: 10.1007/978-1-4614-6154-8_45.
You can read the full text:

Read

Contributors

The following have contributed to this page