Secure Multiparty Hashing Protocol Using Discrete Logarithms π
Discover a novel multiparty hashing protocol built on the discrete logarithm problem, enhancing security and collaboration in cryptographic applications. Learn how this innovative approach improves data integrity and privacy in multi-user environments.

Computer Science & IT Conference Proceedings
44 views β’ Nov 26, 2023

About this video
A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem
Daniel Zentai, Mihail Plesa, and Robin Frot, xtendr, Hungary
Abstract
Let X and Y be two sets and suppose that a set of participants P = {P1, P2, . . . , Pn} would like to calculate the keyed hash value of some message m β X known to a single participant in P called the data owner. Also, suppose that each participant Pi knows a secret value xi β X. In this paper, we will propose a protocol that enables the participants in this setup to calculate the value y = H(m, x1, x2, . . . , xn) of a hash function H : Xn+1 βΒ» Y such that:
β The function H is a one-way function.
β Participants in P\{Pi} cannot obtain xi.
β Participants other than the data owner cannot obtain m.
β The hash value y = H(m, x1, x2, . . . , xn) remains the same regardless the order of the secret xi values.
Keywords
Hash functions, Discrete logarithm problem, Anonymization.
Full Text : https://aircconline.com/csit/papers/vol13/csit132110.pdf
Abstract URL : https://aircconline.com/csit/abstract/v13n21/csit132110.html
Volume URL : https://airccse.org/csit/V13N21.html
#cryptography #blockchain #security #protocol #cybersecurity
Daniel Zentai, Mihail Plesa, and Robin Frot, xtendr, Hungary
Abstract
Let X and Y be two sets and suppose that a set of participants P = {P1, P2, . . . , Pn} would like to calculate the keyed hash value of some message m β X known to a single participant in P called the data owner. Also, suppose that each participant Pi knows a secret value xi β X. In this paper, we will propose a protocol that enables the participants in this setup to calculate the value y = H(m, x1, x2, . . . , xn) of a hash function H : Xn+1 βΒ» Y such that:
β The function H is a one-way function.
β Participants in P\{Pi} cannot obtain xi.
β Participants other than the data owner cannot obtain m.
β The hash value y = H(m, x1, x2, . . . , xn) remains the same regardless the order of the secret xi values.
Keywords
Hash functions, Discrete logarithm problem, Anonymization.
Full Text : https://aircconline.com/csit/papers/vol13/csit132110.pdf
Abstract URL : https://aircconline.com/csit/abstract/v13n21/csit132110.html
Volume URL : https://airccse.org/csit/V13N21.html
#cryptography #blockchain #security #protocol #cybersecurity
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
44
Likes
1
Duration
26:07
Published
Nov 26, 2023