How to Cite?
Nagashetty B Kolar, Dr. Raju RamDr.P.S.V.Vachaspati, Dr.P.Pardhasaradhi, Dr.SK.Nazeerakrishna Gondkar, "An Enhanced Mutual Authentication Scheme using One-Time Passwords with Images," International Journal of Computer Trends and Technology, vol. 68, no. 1, pp. 45-51, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I1P111
Is it possible to prove a statement without yielding anything beyond its validity? Zeroknowledge protocols, as their name indicates, are cryptographic protocols which do not reveal any information or secret itself during the protocol, or to any eaves- dropper. These proofs possess some very interesting features, and as the secret itself is not transferred to the verifying principal, they cannot try to masquerade as you to any third party
Zero knowledge, Identity authentication, Visual Cryptography, Mutual Authentication.
 G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, ?Visual cryptography for general access structures,? Information and Computation, 129(2), 1996, pp. 86–106.
 C. Blundo, A. De Santis, and D. R. Stinson, ?On the contrast in visual cryptography schemes,? Journal of Cryptology, 12(4), 1999, pp.261–289.
 M. Naor and A. Shamir, ?Visual cryptography,? in Advances in Cryptology-EUROCRYPT ‘94, LNCS 950, Springer-Verlag, 1995, pp.1–12.
 W. G. Tzeng and C. M. Hu, ?A new approach for visual cryptography,? Designs, Codes and Cryptography, 27, 2002, pp. 207–227.
 E. R. Verheul and H. C. A. van Tilborg, ?Constructions and Properties of k out of n Visual Secret Sharing Schemes,? Designs, Codes and Cryptography, 11, 1997, pp. 179–196.
 Chetanatii Hegde, Manu S, P Deepa Shenoy, Venugopal K R, L M Patnaik ?Secure Authentication using Image Processing and Visual Cryptography for Banking Applications? 978-1-4244-2963-9/13/$26 © 2013 IEEE.
 C. M. Hu and W. G. Tzeng, ?Cheating Prevention in Visual Cryptography? IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007,pp. 36-45