Mathematical Foundations and Implementation of Coniks Key Transparency

dc.authorid MOLLAKUQE, Elissa/0000-0003-0508-105X
dc.authorscopusid 59092306200
dc.authorscopusid 6507328166
dc.authorscopusid 37010805100
dc.authorwosid MOLLAKUQE, ELISSA/HKO-9388-2023
dc.contributor.author Dağ, Hasan
dc.contributor.author Dag, Hasan
dc.contributor.author Dimitrova, Vesna
dc.contributor.other Management Information Systems
dc.date.accessioned 2024-12-15T16:32:43Z
dc.date.available 2024-12-15T16:32:43Z
dc.date.issued 2024
dc.department Kadir Has University en_US
dc.department-temp [Mollakuqe, Elissa; Dag, Hasan] Kadir Has Univ, Fac Management Informat Syst, TR-340831 Istanbul, Turkiye; [Dimitrova, Vesna] Fac Informat Sci & Comp Engn, Skopje 1000, North Macedonia en_US
dc.description MOLLAKUQE, Elissa/0000-0003-0508-105X en_US
dc.description.abstract This research paper explores the CONIKS key management system's security and efficiency, a system designed to ensure transparency and privacy in cryptographic operations. We conducted a comprehensive analysis of the underlying mathematical principles, focusing on cryptographic hash functions and digital signature schemes, and their implementation in the CONIKS model. Through the use of Merkle trees, we verified the integrity of the system, while zero-knowledge proofs were utilized to ensure the confidentiality of key bindings. We conducted experimental evaluations to measure the performance of cryptographic operations like key generation, signing, and verification with varying key sizes and compared the results against theoretical expectations. Our findings demonstrate that the system performs as predicted by cryptographic theory, with only minor deviations in computational time complexities. The analysis also reveals significant trade-offs between security and efficiency, particularly when larger key sizes are used. These results confirm that the CONIKS system offers a robust framework for secure and efficient key management, highlighting its potential for real-world applications in secure communication systems. en_US
dc.description.sponsorship European Union in the Framework of ERASMUS MUNDUS Project CyberMASC; [101082683] en_US
dc.description.sponsorship This research was suppored partially by the European Union in the Framework of ERASMUS MUNDUS Project CyberMASC, (Project#101082683) (https://cybermacs.eu/ accessed on: 12 August 2024). en_US
dc.description.woscitationindex Science Citation Index Expanded
dc.identifier.citationcount 0
dc.identifier.doi 10.3390/app14219725
dc.identifier.issn 2076-3417
dc.identifier.issue 21 en_US
dc.identifier.scopus 2-s2.0-85208469916
dc.identifier.scopusquality Q3
dc.identifier.uri https://doi.org/10.3390/app14219725
dc.identifier.uri https://hdl.handle.net/20.500.12469/7081
dc.identifier.volume 14 en_US
dc.identifier.wos WOS:001350965600001
dc.identifier.wosquality Q2
dc.language.iso en en_US
dc.publisher Mdpi en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.scopus.citedbyCount 0
dc.subject Merkle tree en_US
dc.subject CONIKS en_US
dc.subject key en_US
dc.subject transparency en_US
dc.subject security and hash en_US
dc.title Mathematical Foundations and Implementation of Coniks Key Transparency en_US
dc.type Article en_US
dc.wos.citedbyCount 0
dspace.entity.type Publication
relation.isAuthorOfPublication e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscovery e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isOrgUnitOfPublication ff62e329-217b-4857-88f0-1dae00646b8c
relation.isOrgUnitOfPublication.latestForDiscovery ff62e329-217b-4857-88f0-1dae00646b8c

Files