Next Article in Journal
No Cell Left behind: Automated, Stochastic, Physics-Based Tracking of Every Cell in a Dense, Growing Colony
Next Article in Special Issue
Overview of Distributed Machine Learning Techniques for 6G Networks
Previous Article in Journal
Using Explainable Machine Learning to Explore the Impact of Synoptic Reporting on Prostate Cancer
Previous Article in Special Issue
Resource Allocation for Intelligent Reflecting Surfaces Assisted Federated Learning System with Imperfect CSI
 
 
Article
Peer-Review Record

Adaptive Authentication Protocol Based on Zero-Knowledge Proof

Algorithms 2022, 15(2), 50; https://doi.org/10.3390/a15020050
by Nikita Konstantinovich Chistousov 1,*, Igor Anatolyevich Kalmykov 1, Daniil Vyacheslavovich Dukhovnyj 1, Maksim Igorevich Kalmykov 1 and Aleksandr Anatolyevich Olenev 2
Reviewer 1:
Reviewer 2: Anonymous
Reviewer 3:
Algorithms 2022, 15(2), 50; https://doi.org/10.3390/a15020050
Submission received: 23 December 2021 / Revised: 21 January 2022 / Accepted: 27 January 2022 / Published: 30 January 2022
(This article belongs to the Special Issue Algorithms for Communication Networks)

Round 1

Reviewer 1 Report

The main disadvantage of most authentication protocols is the use of symmetric and asymmetric encryption systems to ensure high cryptographic strength. As a result, there is a problem of delivering keys to the sides of the prover and the verifier. At the same time, compromising the keys will lead to a decrease in the level of protection of the transmitted data. Therefore, ZKAP, which has minimal time costs, is developed in the article. A scheme for adapting protocol parameters has been proposed to increase efficiency in this paper. 
However, there are some issues that need to be improved:
1. In the second contribution point, the authors say that this scheme reduces the confidentiality level to increase the amount of useful information transmitted, does this have an impact on the confidentiality of the message? We know that the lower the confidentiality level, the higher the probability of the message being modified or stolen. If the amount of messages is very large, should the message be transmitted directly without encryption?
2. In line 76, Page 2, “change” should be changed to “changes”. In Page 4, the representation of "noisy" keys and "Noisy" keys should be unified. the paper needs further proofreading.
3. In this paper, the proposed scheme is to reduce the confidentiality level by reducing the parameter level on the basis of the original ZKAP scheme. However, the author does not analyze the security of the scheme, and the security of the scheme cannot be proved.
4. The experimental results of this scheme are not compared with the existing schemes, and it is impossible to see the efficiency improvement of the proposed scheme. From Fig. 2 and Fig. 3, we can see that the difference between the maximal level and the minimal level is very small, so the contribution to improving the authentication efficiency by reducing the confidentiality level is questionable.

Comments for author File: Comments.pdf

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

Overall, it is a well-written manuscript. The introduction is relevant and provides sufficient information about the previous study findings is presented for readers to follow the present study rationale and procedures.

 Specific comments

  1. Title can be more meaningful.
  2. Small spelling and grammer corrections are required.
  3. Analysis of the results of the conducted research can be elaborated to show the novelty of the research.

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Reviewer 3 Report

This article proposed a Zero-knowledge authentication protocol to minimize the time cost. The article is well organized.
There are some comments to improve the article:

1. Section 2 described the literature review. It doesn't reflect recent research.  It is recommended to include more literature reviews.
2. It would be better to make a table to show the pro and cons of the literature.
3. The article includes some results, but there is no comparison with other methods.
4. It is also recommended to add the computational complexity of the proposed method if applicable.

 

Author Response

Please see the attachment.

Author Response File: Author Response.docx

Back to TopTop