Adaptive Authentication Protocol Based on Zero-Knowledge Proof
Round 1
Reviewer 1 Report
The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem of delivering keys to the sides of the prover and the verifier. At the same time, compromising the keys will lead to a decrease in the level of protection of the transmitted data. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been proposed to increase efficiency in this paper.
However, there are some issues that need to be improved:
1. In the second contribution point, the authors say that this scheme reduces the confidentiality level to increase the amount of useful information transmitted, does this have an impact on the confidentiality of the message? We know that the lower the confidentiality level, the higher the probability of the message being modified or stolen. If the amount of messages is very large, should the message be transmitted directly without encryption?
2. In line 76, Page 2, “change” should be changed to “changes”. In Page 4, the representation of "noisy" keys and "Noisy" keys should be unified. the paper needs further proofreading.
3. In this paper, the proposed scheme is to reduce the confidentiality level by reducing the parameter level on the basis of the original ZKAP scheme. However, the author does not analyze the security of the scheme, and the security of the scheme cannot be proved.
4. The experimental results of this scheme are not compared with the existing schemes, and it is impossible to see the efficiency improvement of the proposed scheme. From Fig. 2 and Fig. 3, we can see that the difference between the maximal level and the minimal level is very small, so the contribution to improving the authentication efficiency by reducing the confidentiality level is questionable.
Comments for author File: Comments.pdf
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Reviewer 2 Report
Overall, it is a well-written manuscript. The introduction is relevant and provides sufficient information about the previous study findings is presented for readers to follow the present study rationale and procedures.
Specific comments
- Title can be more meaningful.
- Small spelling and grammer corrections are required.
- Analysis of the results of the conducted research can be elaborated to show the novelty of the research.
Author Response
Please see the attachment.
Author Response File: Author Response.docx
Reviewer 3 Report
This article proposed a Zero-knowledge authentication protocol to minimize the time cost. The article is well organized.
There are some comments to improve the article:
1. Section 2 described the literature review. It doesn't reflect recent research. It is recommended to include more literature reviews.
2. It would be better to make a table to show the pro and cons of the literature.
3. The article includes some results, but there is no comparison with other methods.
4. It is also recommended to add the computational complexity of the proposed method if applicable.
Author Response
Please see the attachment.
Author Response File: Author Response.docx