|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
Viadeo
|
English
|
Français
|
Español
|
العربية
|
 
International Journal of Innovation and Applied Studies
ISSN: 2028-9324     CODEN: IJIABO     OCLC Number: 828807274     ZDB-ID: 2703985-7
 
 
Thursday 28 March 2024

About IJIAS

News

Submission

Downloads

Archives

Custom Search

Contact

  • Contact us
  • Newsletter:

Connect with IJIAS

  Now IJIAS is indexed in EBSCO, ResearchGate, ProQuest, Chemical Abstracts Service, Index Copernicus, IET Inspec Direct, Ulrichs Web, Google Scholar, CAS Abstracts, J-Gate, UDL Library, CiteSeerX, WorldCat, Scirus, Research Bible and getCited, etc.  
 
 
 

ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION


Volume 11, Issue 1, April 2015, Pages 90–95

 ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION

Nashwan Ahmed Al-Majmar1, Dmitriy Nikolaevich Moldovyan2, and Nikolay Andreevich Moldovyan3

1 Department of Math's and Computers, Faculty of Science, Ibb University, Ibb, Yemen
2 Department of Automated Systems of Information Processing, Faculty of Computer technologies and Informatics, St. Petersburg State Elecrotechnical University "LETI", St. Petersburg, Russia
3 Department of Automated Systems of Information Processing, Faculty of Computer technologies and Informatics, St. Petersburg State Elecrotechnical University "LETI", St. Petersburg, Russia

Original language: English

Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


The paper considers the design of two-step zero-knowledge protocols of two different types: 1) protocols based on the public encryption 2) protocols based on the public key agreement scheme. The novelty of the proposed design relating to the first type of protocols consists in using specified labels that are embedded in the encrypted message. Due to using the labels the proposed design is free of using hash-functions and provides higher performance and cheaper hardware implementation. The paper describes protocols implemented with using El-Gamal, Rabin, and RSA public-encryption algorithms. There are discussed details of the protocol design, which depends on the used public-encryption algorithm. The novelty of the proposed design relating to the second-type protocols consists in using the public key agreement scheme.

Author Keywords: cryptographic protocol, authentication, public key, secret key, public encryption, discrete logarithm problem, factorization problem.


How to Cite this Article


Nashwan Ahmed Al-Majmar, Dmitriy Nikolaevich Moldovyan, and Nikolay Andreevich Moldovyan, “ZERO-KNOWLEDGE PROTOCOLS BASED ON PUBLIC-ENCRYPTION,” International Journal of Innovation and Applied Studies, vol. 11, no. 1, pp. 90–95, April 2015.