Professional Documents
Culture Documents
● Decryption:
DS-NIZKP-based authentication
What the user knows yields id1. The identity is then hashed, using a hash function, to
obtain a digest of fixed size.
Something user knows refers to password or PIN, social security number, mother’s
maiden name, pet’s name, a picture, etc
DS-NIZKP-based authentication
● Stage 2: Generating user’s signature (Sign)
The user’s signature is obtained by encrypting each hashed component of the identity
above with the user’s private key. This encryption provides confidentiality, non-
repudiation and integrity.
After the signature has been generated, the pair user identity and signature, (ID,
sign) is sent to the server for verification.
DS-NIZKP-based authentication
● Stage 3: Verification of user’s information
● The SHA-1 family algorithms which we have chosen are designed to provide special
properties, such as resistance to collision, pre-image, and second pre-image attacks.
● Therefore, the proposal does not suffer from usual attacks based on cryptographic
operations (also like identity theft and Man in the Middle attack), because its security
is supported by NIZKP based on digital signature, current standard hashing and
encryption.
THANK YOU