Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A New Approach:Proactive Verifiable Security Scheme Based On Threshold with Key Refreshment


Affiliations
1 Department of Computer Science from Bhilai School of Engineering (C.S.V.T.U.), India
     

   Subscribe/Renew Journal


In public key infrastructure, each node has a public private key pair. Public key is used for encryption of message while private key is applied on that message to generate original data. When sender used own public key for encryption of message then he attach private key with that message and send to the receiver. There is the problem of security, how to securely move private key over the network. In this paper, we have developed refreshment protocol for providing security to the private key (private key is known as share). Refreshment protocol allows refreshing shares using different cryptography algorithm such as DES, AES and Blowfish within each node to refresh all sub share which is distributed by threshold cryptography.


Keywords

Refreshment Protocol, Proactive Secret Sharing (PSS), Threshold Cryptography (TC), Cryptography Function (DES, AES and Blowfish).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 177

PDF Views: 1




  • A New Approach:Proactive Verifiable Security Scheme Based On Threshold with Key Refreshment

Abstract Views: 177  |  PDF Views: 1

Authors

Rashmi Singh
Department of Computer Science from Bhilai School of Engineering (C.S.V.T.U.), India

Abstract


In public key infrastructure, each node has a public private key pair. Public key is used for encryption of message while private key is applied on that message to generate original data. When sender used own public key for encryption of message then he attach private key with that message and send to the receiver. There is the problem of security, how to securely move private key over the network. In this paper, we have developed refreshment protocol for providing security to the private key (private key is known as share). Refreshment protocol allows refreshing shares using different cryptography algorithm such as DES, AES and Blowfish within each node to refresh all sub share which is distributed by threshold cryptography.


Keywords


Refreshment Protocol, Proactive Secret Sharing (PSS), Threshold Cryptography (TC), Cryptography Function (DES, AES and Blowfish).