Education, Science, Technology, Innovation and Life
Open Access
Sign In

An Efficient Identity Authentication Mechanism Based on Algebraic Curves and Zero-Knowledge Proofs

Download as PDF

DOI: 10.23977/jeis.2025.100212 | Downloads: 7 | Views: 101

Author(s)

Shi Wang 1

Affiliation(s)

1 Hainan Vocational University of Science and Technology, Haikou, 571126, China

Corresponding Author

Shi Wang

ABSTRACT

With the rapid development of the digital economy and the Internet of Things, identity authentication in resource-constrained environments faces challenges such as low efficiency and inadequate privacy protection. Addressing the high computational and communication overhead of traditional RSA and ECC authentication mechanisms, this study proposes an efficient identity authentication mechanism (AC-ZKP) based on algebraic curves and non-interactive zero-knowledge proofs (NIZK). This mechanism leverages algebraic curve group operations to achieve lightweight key management and employs zero-knowledge proofs to ensure information concealment and anti-forgery during identity verification. The paper conducts a systematic study across four dimensions: system modeling, algorithm design, security analysis, and performance evaluation. Experimental results demonstrate that while maintaining 128-bit security strength, the AC-ZKP mechanism reduces authentication latency by approximately 44% and communication overhead by about 40%. It also exhibits strong scalability and resistance to attacks, significantly outperforming traditional ECC schemes. These findings provide a viable solution for lightweight, high-security identity authentication in IoT, edge computing, and cross-border data exchange environments.

KEYWORDS

Algebraic Curves, Zero-Knowledge Proofs, Identity Authentication, Lightweight Security Protocols, Privacy Protection

CITE THIS PAPER

Shi Wang, An Efficient Identity Authentication Mechanism Based on Algebraic Curves and Zero-Knowledge Proofs. Journal of Electronics and Information Science (2025) Vol. 10: 100-105. DOI: http://dx.doi.org/10.23977/10.23977/jeis.2025.100212.

REFERENCES

[1] Xing F.Y., Dong A., Sun Y.Y., Tong F., and Cheng G. A Review of Zero Trust Management for Large-Scale IoT. Acta Electronica Sinica, 2025, 1-33.
[2] Sun J.J., Zheng J.L., Yang Y., Li J.F., and Zhang X.M.(2025).Research and Practice on Security Management of the Unified Identity Authentication System in Higher Education Institutions. Network Security Technology & Application, 10, 93-95.
[3] Dou H.Z.(2025).Attribute-Based Encryption-Based Embedded Electronic Information System Access Authentication Method. Journal of Xi'an University(Natural Science Edition), 4, 46-53.
[4] Wang H.X., Wang H., Ma R., Liang X., and Li S.J.(2025).An Identity Authentication Method for Power Grid Terminals Based on Privacy-Preserving Homomorphic Encryption Algorithms. Electronic Design Engineering, 19, 141-145.
[5] Wang N.(2025). Design and Analysis of Secure Communication Protocols for the Internet of Things. Information & Computer, 19, 82-84.
[6] Xue T.T., Wang J.W., Zhang J., Dai X.T., and Hu X.(2025). Multi-Stage Identity Authentication Method for Cross-Platform File-Based Database User Access. Information Technology and Informatization, 9, 157-160.

Downloads: 13481
Visits: 561354

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.