Mathematical Foundations and Implementation of CONIKS Key Transparency
This research paper explores the CONIKS key management system’s security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and dig...
Saved in:
| Main Authors: | Elissa Mollakuqe, Hasan Dag, Vesna Dimitrova |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-10-01
|
| Series: | Applied Sciences |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2076-3417/14/21/9725 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Algorithm for Key Transparency with Transparent Logs [version 2; peer review: 2 approved, 1 approved with reservations, 1 not approved]
by: Shasivar Rexhepi, et al.
Published: (2024-10-01) -
Optimizing Post-Quantum Digital Signatures with Verkle Trees and Quantum Seed-Based Pseudo-Random Generators
by: Maksim Iavich, et al.
Published: (2025-03-01) -
An Enhanced Cloud Network Integrity and Fair Compensation Scheme Through Data Structures and Blockchain Enforcement
by: Renato Racelis Maaliw
Published: (2025-03-01) -
BLS-MT-ZKP: A Novel Approach to Selective Disclosure of Claims From Digital Credentials
by: Seila Becirovic Ramic, et al.
Published: (2024-01-01) -
Post-Quantum Digital Signature: Verkle-Based HORST
by: Maksim Iavich, et al.
Published: (2025-05-01)