Model Checking Zero Knowledge System
What is it about?
The Zero Knowledge protocol provides authentication without the need to send any private and confidential information across the network. In this paper, we have modeled the general working of the Zero Knowledge system by considering the various states that a prover (sender) and a verifier (receiver) will be in during the execution of the protocol, and have proved that the authentication of the prover is possible.
Why is it important?
Zero Knowledge system is usually considered to be unintrudeable, but that does not stop hackers from attempting to intrude this protocol. So in this paper, we have also considered the various states that an intruder will be in while intruding, and have shown that it is possible for the user to detect if somebody is trying to intrude the Zero Knowledge system.
The following have contributed to this page: Sanjay Singh
In partnership with: