Mathematical Foundations and Implementation of Coniks Key Transparency
| dc.contributor.author | Mollakuqe, Elissa | |
| dc.contributor.author | Dag, Hasan | |
| dc.contributor.author | Dimitrova, Vesna | |
| dc.contributor.other | Management Information Systems | |
| dc.contributor.other | 03. Faculty of Economics, Administrative and Social Sciences | |
| dc.contributor.other | 01. Kadir Has University | |
| dc.date.accessioned | 2024-12-15T16:32:43Z | |
| dc.date.available | 2024-12-15T16:32:43Z | |
| dc.date.issued | 2024 | |
| dc.description | MOLLAKUQE, Elissa/0000-0003-0508-105X | en_US |
| dc.description.abstract | This research paper explores the CONIKS key management system's security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems. | en_US |
| dc.description.sponsorship | European Union in the Framework of ERASMUS MUNDUS Project CyberMASC; [101082683] | en_US |
| dc.description.sponsorship | This research was suppored partially by the European Union in the Framework of ERASMUS MUNDUS Project CyberMASC, (Project#101082683) (https://cybermacs.eu/ accessed on: 12 August 2024). | en_US |
| dc.identifier.citationcount | 0 | |
| dc.identifier.doi | 10.3390/app14219725 | |
| dc.identifier.issn | 2076-3417 | |
| dc.identifier.scopus | 2-s2.0-85208469916 | |
| dc.identifier.uri | https://doi.org/10.3390/app14219725 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.12469/7081 | |
| dc.language.iso | en | en_US |
| dc.publisher | Mdpi | en_US |
| dc.relation.ispartof | Applied Sciences | |
| dc.rights | info:eu-repo/semantics/openAccess | en_US |
| dc.subject | Merkle tree | en_US |
| dc.subject | CONIKS | en_US |
| dc.subject | key | en_US |
| dc.subject | transparency | en_US |
| dc.subject | security and hash | en_US |
| dc.title | Mathematical Foundations and Implementation of Coniks Key Transparency | en_US |
| dc.type | Article | en_US |
| dspace.entity.type | Publication | |
| gdc.author.id | MOLLAKUQE, Elissa/0000-0003-0508-105X | |
| gdc.author.institutional | Dağ, Hasan | |
| gdc.author.scopusid | 59092306200 | |
| gdc.author.scopusid | 6507328166 | |
| gdc.author.scopusid | 37010805100 | |
| gdc.author.wosid | MOLLAKUQE, ELISSA/HKO-9388-2023 | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | open access | |
| gdc.coar.type | text::journal::journal article | |
| gdc.description.department | Kadir Has University | en_US |
| gdc.description.departmenttemp | [Mollakuqe, Elissa; Dag, Hasan] Kadir Has Univ, Fac Management Informat Syst, TR-340831 Istanbul, Turkiye; [Dimitrova, Vesna] Fac Informat Sci & Comp Engn, Skopje 1000, North Macedonia | en_US |
| gdc.description.issue | 21 | en_US |
| gdc.description.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | Q3 | |
| gdc.description.startpage | 9725 | |
| gdc.description.volume | 14 | en_US |
| gdc.description.woscitationindex | Science Citation Index Expanded | |
| gdc.description.wosquality | Q2 | |
| gdc.identifier.openalex | W4403733694 | |
| gdc.identifier.wos | WOS:001350965600001 | |
| gdc.oaire.accesstype | GOLD | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 0.0 | |
| gdc.oaire.influence | 2.5942106E-9 | |
| gdc.oaire.isgreen | false | |
| gdc.oaire.keywords | transparency | |
| gdc.oaire.keywords | Technology | |
| gdc.oaire.keywords | QH301-705.5 | |
| gdc.oaire.keywords | T | |
| gdc.oaire.keywords | Physics | |
| gdc.oaire.keywords | QC1-999 | |
| gdc.oaire.keywords | Engineering (General). Civil engineering (General) | |
| gdc.oaire.keywords | Merkle tree | |
| gdc.oaire.keywords | CONIKS | |
| gdc.oaire.keywords | Chemistry | |
| gdc.oaire.keywords | key | |
| gdc.oaire.keywords | security and hash | |
| gdc.oaire.keywords | TA1-2040 | |
| gdc.oaire.keywords | Biology (General) | |
| gdc.oaire.keywords | QD1-999 | |
| gdc.oaire.popularity | 2.9478422E-9 | |
| gdc.oaire.publicfunded | false | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.0 | |
| gdc.opencitations.count | 0 | |
| gdc.plumx.mendeley | 1 | |
| gdc.plumx.newscount | 1 | |
| gdc.plumx.scopuscites | 0 | |
| gdc.scopus.citedcount | 0 | |
| gdc.wos.citedcount | 0 | |
| relation.isAuthorOfPublication | e02bc683-b72e-4da4-a5db-ddebeb21e8e7 | |
| relation.isAuthorOfPublication.latestForDiscovery | e02bc683-b72e-4da4-a5db-ddebeb21e8e7 | |
| relation.isOrgUnitOfPublication | ff62e329-217b-4857-88f0-1dae00646b8c | |
| relation.isOrgUnitOfPublication | acb86067-a99a-4664-b6e9-16ad10183800 | |
| relation.isOrgUnitOfPublication | b20623fc-1264-4244-9847-a4729ca7508c | |
| relation.isOrgUnitOfPublication.latestForDiscovery | ff62e329-217b-4857-88f0-1dae00646b8c |