On-Demand Device Authentication using Zero-Knowledge Proofs for Smart Systems

Author:

Zhong Yadi1ORCID,Hovanes Joshua1ORCID,Guin Ujjwal1ORCID

Affiliation:

1. Auburn University, Auburn, AL, USA

Publisher

ACM

Reference42 articles.

1. Martin Albrecht , Lorenzo Grassi , Christian Rechberger , Arnab Roy , and Tyge Tiessen . 2016 . MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In Int. Conf. on the Theory and Application of Cryptology and Information Security. Springer, 191--219 . Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, and Tyge Tiessen. 2016. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. In Int. Conf. on the Theory and Application of Cryptology and Information Security. Springer, 191--219.

2. IoT Analytics. 2022. State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally. https://iot-analytics.com/number-connected-iot-devices/ IoT Analytics. 2022. State of IoT 2022: Number of connected IoT devices growing 18% to 14.4 billion globally. https://iot-analytics.com/number-connected-iot-devices/

3. Aydin Aysu Ege Gulcan Daisuke Moriyama Patrick Schaumont and Moti Yung. 2015. End-to-end design of a PUF-based privacy preserving authentication protocol. In Cryptographic Hardware and Embedded Systems (CHES). 556--576. Aydin Aysu Ege Gulcan Daisuke Moriyama Patrick Schaumont and Moti Yung. 2015. End-to-end design of a PUF-based privacy preserving authentication protocol. In Cryptographic Hardware and Embedded Systems (CHES). 556--576.

4. Georg T Becker. 2015. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In Cryptographic Hardware and Embedded Systems (CHES). 535--555. Georg T Becker. 2015. The gap between promise and reality: On the insecurity of XOR arbiter PUFs. In Cryptographic Hardware and Embedded Systems (CHES). 535--555.

5. Eli Ben-Sasson , Alessandro Chiesa , Eran Tromer , and Madars Virza . 2014 . Succinct {Non-Interactive} Zero Knowledge for a von Neumann Architecture . In 23rd USENIX Security Symposium (USENIX Security 14) . 781--796. Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct {Non-Interactive} Zero Knowledge for a von Neumann Architecture. In 23rd USENIX Security Symposium (USENIX Security 14). 781--796.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3