Skip to main content

Showing 1–2 of 2 results for author: Zentai, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.17498  [pdf, other

    cs.CR

    A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem

    Authors: Daniel Zentai, Mihail Plesa, Robin Frot

    Abstract: Let $\mathcal{X}$ and $\mathcal{Y}$ be two sets and suppose that a set of participants $P=\{P_1,P_2,\dots,P_n\}$ would like to calculate the keyed hash value of some message $m\in\mathcal{X}$ known to a single participant in $P$ called the data owner. Also, suppose that each participant $P_i$ knows a secret value $x_i\in\mathcal{X}$. In this paper, we will propose a protocol that enables the parti… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: 11 pages, 2 figures, presented at the 3rd International Conference on Cryptography and Blockchain, published in Computer Science & Information Technology (CS & IT), ISSN : 2231 - 5403, Volume 13, Number 21, November 2023

    Journal ref: Computer Science & Information Technology (CS & IT), ISSN : 2231 - 5403, Volume 13, Number 21, November 2023

  2. arXiv:2012.13182  [pdf

    cs.DM cs.LG

    Graph Theory in the Classification of Information Systems

    Authors: Daniel Zentai

    Abstract: Risk classification plays an important role in many regulations and standards. However, a general method that provides an optimal classification has not been proposed yet. Also, the criteria of optimality are not defined in these regulations. In this work, we will propose a mathematical model that is sufficient to describe this problem, and we also propose an algorithm that classifies graph vertic… ▽ More

    Submitted 27 December, 2020; v1 submitted 24 December, 2020; originally announced December 2020.

    Comments: 6 pages