-
A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem
Abstract: Let $\mathcal{X}$ and $\mathcal{Y}$ be two sets and suppose that a set of participants $P=\{P_1,P_2,\dots,P_n\}$ would like to calculate the keyed hash value of some message $m\in\mathcal{X}$ known to a single participant in $P$ called the data owner. Also, suppose that each participant $P_i$ knows a secret value $x_i\in\mathcal{X}$. In this paper, we will propose a protocol that enables the parti… ▽ More
Submitted 29 November, 2023; originally announced November 2023.
Comments: 11 pages, 2 figures, presented at the 3rd International Conference on Cryptography and Blockchain, published in Computer Science & Information Technology (CS & IT), ISSN : 2231 - 5403, Volume 13, Number 21, November 2023
Journal ref: Computer Science & Information Technology (CS & IT), ISSN : 2231 - 5403, Volume 13, Number 21, November 2023
-
Graph Theory in the Classification of Information Systems
Abstract: Risk classification plays an important role in many regulations and standards. However, a general method that provides an optimal classification has not been proposed yet. Also, the criteria of optimality are not defined in these regulations. In this work, we will propose a mathematical model that is sufficient to describe this problem, and we also propose an algorithm that classifies graph vertic… ▽ More
Submitted 27 December, 2020; v1 submitted 24 December, 2020; originally announced December 2020.
Comments: 6 pages