Authentication protocol based on ellipitc curve cryptography

Nicolae Constantinescu


The authentication protocols based on classic cryptography use public-key cryptosystems for establishing the common key. Some of them have been proven to be secure but they require high amount of resources and they need large keys. Applying an elliptic curve authentication protocol the memory and the power consumption are lower. Another advantage is that this kind of protocols are secure enough even if a small key is used. In this paper we present an authentification protocol based on elliptic curve cryptography and zero knowledge. The protocol is developed for group communication. Every member of the group has a secret information and the communication starts when all this information is put together. So, if one member is not online, the others cannot communicate. We, also, present some situations where this kind of protocol is needed.

Full Text: