A new idea in zero knowledge protocols based on iterated function systems
A secure method of identification is crucial to avoid computer deception dynamics. This could be attained by using zero-knowledge protocols. Zero-knowledge protocols are cryptographic protocols that have been proven to provide secure entity authentication without revealing any knowledge to any entit...
| Main Authors: | Al-Saidi, Nadia Mohammed Ghanim, Md. Said, Mohamad Rushdan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IDOSI Publications
2011
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/25185/ http://psasir.upm.edu.my/id/eprint/25185/1/A%20new%20idea%20in%20zero%20knowledge%20protocols%20based%20on%20iterated%20function%20systems.pdf |
Similar Items
On the security of digital signature protocol based on iterated function systems.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
by: Al-Saidi, Nadia M.G., et al.
Published: (2011)
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014)
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
Complexity and dynamic characteristics of a new discrete-time hyperchaotic model
by: Kadhim, Hayder Natiq, et al.
Published: (2017)
by: Kadhim, Hayder Natiq, et al.
Published: (2017)
Zero knowledge protocol network authentication and monitoring
by: Ang, Yong Seng
Published: (2024)
by: Ang, Yong Seng
Published: (2024)
Interval iterative methods on simultaneous inclusion of polynomial zeros
by: Mohammad Rusli, Syaida Fadhilah
Published: (2017)
by: Mohammad Rusli, Syaida Fadhilah
Published: (2017)
Iterative methods for solving nonlinear equations with multiple zeros
by: Jamaludin, Nur Alif Akid
Published: (2018)
by: Jamaludin, Nur Alif Akid
Published: (2018)
A new public key cryptosystem based on IFS
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2010)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Efficiency analysis for public key systems based on fractal functions.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011)
A generalized fractal dimension as an image feature
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
An improved fuzzy fractal dimension for texture analysis
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
Review of some iterative methods for solving nonlinear equations with multiple zeros
by: Jamaludin, Nur Alif Akid, et al.
Published: (2019)
by: Jamaludin, Nur Alif Akid, et al.
Published: (2019)
A new direction in utilization of chaotic fractal functions for cryptosystems.
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
by: Md Ahadullah, et al.
Published: (2021)
by: Md Ahadullah, et al.
Published: (2021)
Dynamics and complexity of a new 4D chaotic laser system
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
by: Kadhim, Hayder Natiq, et al.
Published: (2019)
Multicast group key management on the internet of medical things using zero knowledge protocol
by: Chong, Wei Feng
Published: (2022)
by: Chong, Wei Feng
Published: (2022)
Zero-knowledge-proof
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Perfect secret sharing scheme based on vertex domination set
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
New subclass of multivalent functions
by: Firas Ghanim,, et al.
Published: (2010)
by: Firas Ghanim,, et al.
Published: (2010)
Background of zero-knowledge proof
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
A new 2D Hénon-logistic map for producing hyperchaotic behavior
by: Hussein, Wafaa A., et al.
Published: (2018)
by: Hussein, Wafaa A., et al.
Published: (2018)
Comparison of the iterative jacobi method and the iterative Domain Green'S Function Method for finite array analysis
by: Ludick, D., et al.
Published: (2016)
by: Ludick, D., et al.
Published: (2016)
Baker's conjecture for functions with real zeros
by: Nicks, Daniel A., et al.
Published: (2018)
by: Nicks, Daniel A., et al.
Published: (2018)
Ideas can bring new wonders
by: Abd Razak, Dzulkifli
Published: (2007)
by: Abd Razak, Dzulkifli
Published: (2007)
Estimation of unknown functions of iterative difference inequalities and their applications
by: Luo, R., et al.
Published: (2014)
by: Luo, R., et al.
Published: (2014)
Fractal attractor based digital signature
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
by: Al-Saidi, Nadia M. G., et al.
Published: (2010)
Finite and infinite field cryptography analysis and applications
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2012)
The impact of periodicity on the zero-crossings of random functions
by: Wilson, Lorna Rachel Maven
Published: (2015)
by: Wilson, Lorna Rachel Maven
Published: (2015)
Non-real zeros of derivatives of meromorphic functions
by: Langley, James
Published: (2017)
by: Langley, James
Published: (2017)
Existences and uniqueness of solutions for some classes of iterative fractional functional integral and differential equations
by: Damag, Faten Hasan Mohammed
Published: (2017)
by: Damag, Faten Hasan Mohammed
Published: (2017)
University E-voting System Utilizing Blockchain Technology and Zero-Knowledge Proofs
by: Lim, Aun Xian
Published: (2022)
by: Lim, Aun Xian
Published: (2022)
A new computation algorithm for a cryptosystem based on Lucas Functions
by: Othman, Mohamed, et al.
Published: (2008)
by: Othman, Mohamed, et al.
Published: (2008)
Period polynomials, derivatives of L-functions, and zeros
of polynomials
by: Diamantis, Nikolaos, et al.
Published: (2018)
by: Diamantis, Nikolaos, et al.
Published: (2018)
Period polynomials, derivatives of L-functions, and zeros
of polynomials
by: Diamantis, Nikolaos, et al.
Published: (2017)
by: Diamantis, Nikolaos, et al.
Published: (2017)
Linear differential polynomials in zero-free meromorphic functions
by: Langley, J.K.
Published: (2018)
by: Langley, J.K.
Published: (2018)
An iteration problem
by: Bekbaev, Ural
Published: (2013)
by: Bekbaev, Ural
Published: (2013)
Iterative structures
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Introducing the Iterative Domain Green's Function Method for finite array analysis
by: Ludick, D., et al.
Published: (2016)
by: Ludick, D., et al.
Published: (2016)
Similar Items
-
On the security of digital signature protocol based on iterated function systems.
by: M. G. AL-Saidi, Nadia, et al.
Published: (2011) -
Improved digital signature protocol using iterated function systems.
by: Al-Saidi, Nadia M.G., et al.
Published: (2011) -
Biometric identification using local iterated function
by: Mohammed G. Al-Saidi, Nadia, et al.
Published: (2014) -
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009) -
Complexity and dynamic characteristics of a new discrete-time hyperchaotic model
by: Kadhim, Hayder Natiq, et al.
Published: (2017)