POLIC, Viktor D.
May 2013
Metalurgia International;May2013, Vol. 18 Issue 5, p131
Academic Journal
Witness-Hiding and deniability are important properties of OR-proofs that make them very useful building block for more complex cryptographic schemes. OR-proofs could be constructed from sigma-protocols that are honest-verifier and honest-prover protocols. A practical construction of efficient OR-proof form of sigma-protocol based on discrete logarithm problem is demonstrated in this paper.


Related Articles

  • Cyberspace Security via Quantum Encryption. Hughes, David H. // Military Technology;2007, Vol. 31 Issue 5, p84 

    The article provides a description of Keyed Communication in Quantum Noise (KCQ), a cryptographic protocol demonstrating perfect or near-perfect security before addressing a new quantum data encryption protocol that uses quantum noise of light. Representations of KCQ related to ultra-secure data...

  • Security Improvments To The Diffie-Hellman Schemes. Kakish, Malek Jakob // International Journal of Research & Reviews in Applied Sciences;2011, Vol. 8 Issue 1, p79 

    The Diffie-Hellman key agreement protocol and the Diffie-Hellman encryption/decryption cryptosystem are historical the firstly defined Public key cryptosystems that enables communicating parties over unsecure communication channel to agree upon a shared secret key and to encrypt /decrypt...

  • VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING. Elboukhari, Mohamed; Azizi, Mostafa; Azizi, Abdelmalek // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p43 

    Unlike classical cryptography which is based on mathematical functions, Quantum Cryptography or Quantum Key Distribution (QKD) exploits the laws of quantum physics to offer unconditionally secure communication. The progress of research in this field allows the anticipation of QKD to be available...

  • Affiliation-Hiding Authenticated Asymmetric Group Key Agreement. Xu, Chang; Li, Zhoujun; Mu, Yi; Guo, Hua; Guo, Tao // Computer Journal;Oct2012, Vol. 55 Issue 10, p1180 

    We introduce the concept of Affiliation-Hiding Authenticated Asymmetric Group Key Agreement (AH-AAGKA) and construct a concrete one-round AH-AAGKA protocol. An AH-AAGKA protocol allows the participants of a group to establish a common encryption key associated with several decryption keys; each...

  • How an Encryption Formula Makes Email Secure.  // Bank Security Report;Oct2012, Vol. 41 Issue 10, p7 

    The article offers information on how the RSA encryption method works. The RSA algorithm consists of three steps including key generation, encryption and decryption. The math behind RSA public key encryption is explained. Steps to computing a public/key combination are discussed. The importance...

  • Analyzing the Efficiency of Text-to-Image Encryption Algorithm. Abusukhon, Ahmad; Talib, Mohammad; Nabulsi, Maher A. // International Journal of Advanced Computer Science & Application;Nov2012, Vol. 3 Issue 11, p35 

    Today many of the activities are performed online through the Internet. One of the methods used to protect the data while sending it through the Internet is cryptography. In a previous work we proposed the Text-to-Image Encryption algorithm (TTIE) as a novel algorithm for network security. In...

  • Authenticity.  // Network Dictionary;2007, p50 

    A definition of the term "authenticity" is presented. It typically refers to the integrity and trustworthiness of data or an entity. Plainly speaking, it is the validity and conformance of the information or identity of a person. Also, it can be secured and verified using cryptographic methods.

  • Encryption.  // Network Dictionary;2007, p176 

    A definition of the term "Encryption" is presented. It refers to the cryptographic transformation of plaintext or cleartext data into a form called cipher text that conceals the original meaning of the data to prevent it from being known or used.

  • Key Rollover.  // Network Dictionary;2007, p274 

    A definition of the term "key rollover," which refers to changing keys during a cryptographic communication session, is presented.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics