ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION
The paper considers the design of two-step zero-knowledge protocols of two different types: protocols based on the public encryption; and protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels...
Gespeichert in:
Veröffentlicht in: | International journal of innovation and applied studies 2015-04, Vol.11 (1), p.90-90 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 90 |
---|---|
container_issue | 1 |
container_start_page | 90 |
container_title | International journal of innovation and applied studies |
container_volume | 11 |
creator | Al-Majmar, Nashwan Ahmed Moldovyan, Dmitriy Nikolaevich Moldovyan, Nikolay Andreevich |
description | The paper considers the design of two-step zero-knowledge protocols of two different types: protocols based on the public encryption; and protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1800452611</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3702114801</sourcerecordid><originalsourceid>FETCH-LOGICAL-p611-12ef12df51c9abd30f1d3b879134f00020d31990f31a34d1fe481189161be5a93</originalsourceid><addsrcrecordid>eNpdjkFLwzAYhoMoOOb-Q8GLl0C-fGmXHLcszmJpSlcRvZR2TcBR17nY_7-CHsTT-x5e3ue5IjPOuKQKubj-02_JIoQDYwxQgEySGcF3U1r6nNvXzGy2JipKW1lts120Xu3MJrJ5VLyss1RTk-vyrahSm9-RG9_0wS1-c06qR1PpJ5rZbapXGT0lABS488A7H8NeNW2HzEOHrVyqie0nBc46BKWYR2hQdOCdkABSQQKtixuFc_Lwc3s6D1-jC9_150fYu75vjm4YQw2SMRHziTVN7_9ND8N4Pk5yNSQyZrDkAvEC669Jgw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1685017243</pqid></control><display><type>article</type><title>ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Al-Majmar, Nashwan Ahmed ; Moldovyan, Dmitriy Nikolaevich ; Moldovyan, Nikolay Andreevich</creator><creatorcontrib>Al-Majmar, Nashwan Ahmed ; Moldovyan, Dmitriy Nikolaevich ; Moldovyan, Nikolay Andreevich</creatorcontrib><description>The paper considers the design of two-step zero-knowledge protocols of two different types: protocols based on the public encryption; and protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme.</description><identifier>ISSN: 2028-9324</identifier><identifier>EISSN: 2028-9324</identifier><language>eng</language><publisher>Rabat: International Journal of Innovation and Applied Studies</publisher><subject>Algorithms ; Consumer goods ; Encryption ; Hardware ; Innovation ; Labels ; Messages</subject><ispartof>International journal of innovation and applied studies, 2015-04, Vol.11 (1), p.90-90</ispartof><rights>Copyright International Journal of Innovation and Applied Studies Apr 2015</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Al-Majmar, Nashwan Ahmed</creatorcontrib><creatorcontrib>Moldovyan, Dmitriy Nikolaevich</creatorcontrib><creatorcontrib>Moldovyan, Nikolay Andreevich</creatorcontrib><title>ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION</title><title>International journal of innovation and applied studies</title><description>The paper considers the design of two-step zero-knowledge protocols of two different types: protocols based on the public encryption; and protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme.</description><subject>Algorithms</subject><subject>Consumer goods</subject><subject>Encryption</subject><subject>Hardware</subject><subject>Innovation</subject><subject>Labels</subject><subject>Messages</subject><issn>2028-9324</issn><issn>2028-9324</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNpdjkFLwzAYhoMoOOb-Q8GLl0C-fGmXHLcszmJpSlcRvZR2TcBR17nY_7-CHsTT-x5e3ue5IjPOuKQKubj-02_JIoQDYwxQgEySGcF3U1r6nNvXzGy2JipKW1lts120Xu3MJrJ5VLyss1RTk-vyrahSm9-RG9_0wS1-c06qR1PpJ5rZbapXGT0lABS488A7H8NeNW2HzEOHrVyqie0nBc46BKWYR2hQdOCdkABSQQKtixuFc_Lwc3s6D1-jC9_150fYu75vjm4YQw2SMRHziTVN7_9ND8N4Pk5yNSQyZrDkAvEC669Jgw</recordid><startdate>20150401</startdate><enddate>20150401</enddate><creator>Al-Majmar, Nashwan Ahmed</creator><creator>Moldovyan, Dmitriy Nikolaevich</creator><creator>Moldovyan, Nikolay Andreevich</creator><general>International Journal of Innovation and Applied Studies</general><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>F28</scope><scope>FR3</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20150401</creationdate><title>ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION</title><author>Al-Majmar, Nashwan Ahmed ; Moldovyan, Dmitriy Nikolaevich ; Moldovyan, Nikolay Andreevich</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p611-12ef12df51c9abd30f1d3b879134f00020d31990f31a34d1fe481189161be5a93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Consumer goods</topic><topic>Encryption</topic><topic>Hardware</topic><topic>Innovation</topic><topic>Labels</topic><topic>Messages</topic><toplevel>online_resources</toplevel><creatorcontrib>Al-Majmar, Nashwan Ahmed</creatorcontrib><creatorcontrib>Moldovyan, Dmitriy Nikolaevich</creatorcontrib><creatorcontrib>Moldovyan, Nikolay Andreevich</creatorcontrib><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Central Korea</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of innovation and applied studies</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Al-Majmar, Nashwan Ahmed</au><au>Moldovyan, Dmitriy Nikolaevich</au><au>Moldovyan, Nikolay Andreevich</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION</atitle><jtitle>International journal of innovation and applied studies</jtitle><date>2015-04-01</date><risdate>2015</risdate><volume>11</volume><issue>1</issue><spage>90</spage><epage>90</epage><pages>90-90</pages><issn>2028-9324</issn><eissn>2028-9324</eissn><abstract>The paper considers the design of two-step zero-knowledge protocols of two different types: protocols based on the public encryption; and protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme.</abstract><cop>Rabat</cop><pub>International Journal of Innovation and Applied Studies</pub><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2028-9324 |
ispartof | International journal of innovation and applied studies, 2015-04, Vol.11 (1), p.90-90 |
issn | 2028-9324 2028-9324 |
language | eng |
recordid | cdi_proquest_miscellaneous_1800452611 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Algorithms Consumer goods Encryption Hardware Innovation Labels Messages |
title | ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T03%3A49%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ZERO-KNOWLEDGE%20PROTOCOLS%20BASED%20ON%20PUBLIC-ENCRYPTION&rft.jtitle=International%20journal%20of%20innovation%20and%20applied%20studies&rft.au=Al-Majmar,%20Nashwan%20Ahmed&rft.date=2015-04-01&rft.volume=11&rft.issue=1&rft.spage=90&rft.epage=90&rft.pages=90-90&rft.issn=2028-9324&rft.eissn=2028-9324&rft_id=info:doi/&rft_dat=%3Cproquest%3E3702114801%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1685017243&rft_id=info:pmid/&rfr_iscdi=true |