Privacy-Preserving Authentication Schemes for Resource-Constrained Devices Using Elliptic Curve Cryptography
This project aims to develop privacy-preserving authentication schemes for resource-constrained devices using ECC. The primary focus will be on designing zero-knowledge proof (ZKP) protocols that allow devices to prove their identity without revealing sensitive information. You can achieve this by exploring various ZKP constructions, such as Schnorr signatures and zk-SNARKs, and adapting them to the specific requirements of elliptic curve cryptography. Additionally, you can investigate the use of threshold cryptography and secure multi-party computation techniques to enable secure and privacy-preserving authentication in distributed systems with resource-constrained devices.
- Privacy-preserving authentication protocols
- Support for resource-constrained devices
- Zero-knowledge proof (ZKP) implementations
- Elliptic curve cryptography (ECC) support
- Threshold cryptography and secure multi-party computation (MPC) techniques
-
Clone the repository:
git clone https://github.com/kartikyagupta/ResourceConstrained-ECC-Auth.git
We welcome contributions to improve our project! To contribute, please follow these steps:
- Fork the repository.
- Create a new branch:
git checkout -b feature/your_feature
. - Make your changes and commit them:
git commit -am 'Add new feature'
. - Push to the branch:
git push origin feature/your_feature
. - Submit a pull request with a detailed description of your changes.
- Please follow our code of conduct and be respectful to others.
- Ensure that your code follows our coding standards and conventions.
- Test your changes thoroughly before submitting a pull request.
- Provide a clear and descriptive title for your pull request and explain the changes you've made.
If you encounter any issues or have suggestions for improvements, please open an issue on GitHub.
This project is licensed under the Apache License 2.0.