Mathematical Foundations and Implementation of Coniks Key Transparency

dc.authoridMOLLAKUQE, Elissa/0000-0003-0508-105X
dc.authorscopusid59092306200
dc.authorscopusid6507328166
dc.authorscopusid37010805100
dc.authorwosidMOLLAKUQE, ELISSA/HKO-9388-2023
dc.contributor.authorMollakuqe, Elissa
dc.contributor.authorDag, Hasan
dc.contributor.authorDimitrova, Vesna
dc.date.accessioned2024-12-15T16:32:43Z
dc.date.available2024-12-15T16:32:43Z
dc.date.issued2024
dc.departmentKadir Has Universityen_US
dc.department-temp[Mollakuqe, Elissa; Dag, Hasan] Kadir Has Univ, Fac Management Informat Syst, TR-340831 Istanbul, Turkiye; [Dimitrova, Vesna] Fac Informat Sci & Comp Engn, Skopje 1000, North Macedoniaen_US
dc.descriptionMOLLAKUQE, Elissa/0000-0003-0508-105Xen_US
dc.description.abstractThis research paper explores the CONIKS key management system's security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems.en_US
dc.description.sponsorshipEuropean Union in the Framework of ERASMUS MUNDUS Project CyberMASC; [101082683]en_US
dc.description.sponsorshipThis research was suppored partially by the European Union in the Framework of ERASMUS MUNDUS Project CyberMASC, (Project#101082683) (https://cybermacs.eu/ accessed on: 12 August 2024).en_US
dc.description.woscitationindexScience Citation Index Expanded
dc.identifier.citation0
dc.identifier.doi10.3390/app14219725
dc.identifier.issn2076-3417
dc.identifier.issue21en_US
dc.identifier.scopus2-s2.0-85208469916
dc.identifier.scopusqualityQ3
dc.identifier.urihttps://doi.org/10.3390/app14219725
dc.identifier.urihttps://hdl.handle.net/20.500.12469/7081
dc.identifier.volume14en_US
dc.identifier.wosWOS:001350965600001
dc.identifier.wosqualityQ2
dc.institutionauthorDağ, Hasan
dc.language.isoenen_US
dc.publisherMdpien_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectMerkle treeen_US
dc.subjectCONIKSen_US
dc.subjectkeyen_US
dc.subjecttransparencyen_US
dc.subjectsecurity and hashen_US
dc.titleMathematical Foundations and Implementation of Coniks Key Transparencyen_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublicatione02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscoverye02bc683-b72e-4da4-a5db-ddebeb21e8e7

Files