Mathematical Foundations and Implementation of CONIKS Key Transparency
This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and dig...
Saved in:
| Main Authors: | Elissa Mollakuqe, Hasan Dag, Vesna Dimitrova |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-10-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/14/21/9725 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Algorithm for Key Transparency with Transparent Logs [version 2; peer review: 2 approved, 1 approved with reservations, 1 not approved]
by: Shasivar Rexhepi, et al.
Published: (2024-10-01) -
BLS-MT-ZKP: A Novel Approach to Selective Disclosure of Claims From Digital Credentials
by: Seila Becirovic Ramic, et al.
Published: (2024-01-01) -
Secure sensitive data deduplication schemes based on deterministic/probabilistic proof of file ownership
by: Yue CHEN, et al.
Published: (2015-09-01) -
Key storage management scheme based on keyed hash tree with state
by: Xiangyu WANG, et al.
Published: (2018-05-01) -
Multi-Tier Blockchain-Based Land Registry Using Fog Computing
by: Ashank Priyadarshi, et al.
Published: (2025-01-01)