Volume 11, Issue 1, April 2015, Pages 90–95
Nashwan Ahmed Al-Majmar1, Dmitriy Nikolaevich Moldovyan2, and Nikolay Andreevich Moldovyan3
1 Department of Math's and Computers, Faculty of Science, Ibb University, Ibb, Yemen
2 Department of Automated Systems of Information Processing, Faculty of Computer technologies and Informatics, St. Petersburg State Elecrotechnical University "LETI", St. Petersburg, Russia
3 Department of Automated Systems of Information Processing, Faculty of Computer technologies and Informatics, St. Petersburg State Elecrotechnical University "LETI", St. Petersburg, Russia
Original language: English
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The paper considers the design of two-step zero-knowledge protocols of two different types: 1) protocols based on the public encryption 2) protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme.
Author Keywords: cryptographic protocol, authentication, public key, secret key, public encryption, discrete logarithm problem, factorization problem.
Nashwan Ahmed Al-Majmar1, Dmitriy Nikolaevich Moldovyan2, and Nikolay Andreevich Moldovyan3
1 Department of Math's and Computers, Faculty of Science, Ibb University, Ibb, Yemen
2 Department of Automated Systems of Information Processing, Faculty of Computer technologies and Informatics, St. Petersburg State Elecrotechnical University "LETI", St. Petersburg, Russia
3 Department of Automated Systems of Information Processing, Faculty of Computer technologies and Informatics, St. Petersburg State Elecrotechnical University "LETI", St. Petersburg, Russia
Original language: English
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
The paper considers the design of two-step zero-knowledge protocols of two different types: 1) protocols based on the public encryption 2) protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme.
Author Keywords: cryptographic protocol, authentication, public key, secret key, public encryption, discrete logarithm problem, factorization problem.
How to Cite this Article
Nashwan Ahmed Al-Majmar, Dmitriy Nikolaevich Moldovyan, and Nikolay Andreevich Moldovyan, “ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION,” International Journal of Innovation and Applied Studies, vol. 11, no. 1, pp. 90–95, April 2015.