@article{ART003109589},
author={Jeong Myoungin},
title={Input Certification protocol for Secure Computation},
journal={Journal of The Korea Society of Computer and Information},
issn={1598-849X},
year={2024},
volume={29},
number={8},
pages={103-112},
doi={10.9708/jksci.2024.29.08.103}
TY - JOUR
AU - Jeong Myoungin
TI - Input Certification protocol for Secure Computation
JO - Journal of The Korea Society of Computer and Information
PY - 2024
VL - 29
IS - 8
PB - The Korean Society Of Computer And Information
SP - 103
EP - 112
SN - 1598-849X
AB - This study was initiated with the aim of authenticating that inputs have not been tampered with without disclosing them in the case of computations where multiple inputs are entered by participants using the same key. In general, in the authentication stage, authentication is performed after the input value is disclosed, but we do not want to reveal the inputs until the end. This is a case of deviating from the traditional security model in which malicious participants exist in cryptography, but it is a malicious attack method that can actually occur enough. Privacy infringement or distortion of calculation results can occur due to malicious manipulation of input values. To prevent this, this study studied a method that can authenticate that the message is not a modified message without disclosing the message using the signature system, zero-knowledge proof, and commitment scheme. In particular, by modifying the ElGamal signature system and combining it with the commitment scheme and zero-knowledge proof, we designed and proved a verification protocol that the input data is not a modified data, and the efficiency was improved by applying batch verification between authentication.
KW - ElGamal signature scheme;commitment scheme;Zero-Knowledge proof of Knowledge;input certification;batch verification
DO - 10.9708/jksci.2024.29.08.103
ER -
Jeong Myoungin. (2024). Input Certification protocol for Secure Computation. Journal of The Korea Society of Computer and Information, 29(8), 103-112.
Jeong Myoungin. 2024, "Input Certification protocol for Secure Computation", Journal of The Korea Society of Computer and Information, vol.29, no.8 pp.103-112. Available from: doi:10.9708/jksci.2024.29.08.103
Jeong Myoungin "Input Certification protocol for Secure Computation" Journal of The Korea Society of Computer and Information 29.8 pp.103-112 (2024) : 103.
Jeong Myoungin. Input Certification protocol for Secure Computation. 2024; 29(8), 103-112. Available from: doi:10.9708/jksci.2024.29.08.103
Jeong Myoungin. "Input Certification protocol for Secure Computation" Journal of The Korea Society of Computer and Information 29, no.8 (2024) : 103-112.doi: 10.9708/jksci.2024.29.08.103
Jeong Myoungin. Input Certification protocol for Secure Computation. Journal of The Korea Society of Computer and Information, 29(8), 103-112. doi: 10.9708/jksci.2024.29.08.103
Jeong Myoungin. Input Certification protocol for Secure Computation. Journal of The Korea Society of Computer and Information. 2024; 29(8) 103-112. doi: 10.9708/jksci.2024.29.08.103
Jeong Myoungin. Input Certification protocol for Secure Computation. 2024; 29(8), 103-112. Available from: doi:10.9708/jksci.2024.29.08.103
Jeong Myoungin. "Input Certification protocol for Secure Computation" Journal of The Korea Society of Computer and Information 29, no.8 (2024) : 103-112.doi: 10.9708/jksci.2024.29.08.103