Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Siva Kumar, P. V.
- Verifiable Secret Sharing Protocol for Mobile Ad-Hoc Networks
Abstract Views :168 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Science, VNRVJIET, Hyderabad, IN
2 Sri Prakash College of Engineering, Tuni, IN
3 CR Rao AIMSCS, University of Hyderabad Campus, Hyderabad, IN
1 Department of Computer Science, VNRVJIET, Hyderabad, IN
2 Sri Prakash College of Engineering, Tuni, IN
3 CR Rao AIMSCS, University of Hyderabad Campus, Hyderabad, IN
Source
Networking and Communication Engineering, Vol 6, No 2 (2014), Pagination:Abstract
Security is the main issue for Mobile Ad-hoc Networks MANETs). Due to unreliable wireless media, host mobility providing secure communications is a challenge. One of the important issues when applying cryptography to MANETs is how to allocate the role of the trusted authority between the nodes. Threshold cryptography provides the way to convey a shared key to a node without the aid of key infrastructure and is suitable for a secret key sharing in a MANETs. Generally, in order to have a secure communication between two (or more) parties, a secure association must be established by sharing a secret. In this paper, we propose a verifiable multi-secret sharing protocol based on an identity based signature scheme, which uses identities of the node’s available in the network. This scheme uses advantages of an identity based signature scheme and hash function for the verifiability, which we do not require much computation. It checks either dealer or participant’s honest, means dealer may distribute a fake share to a certain participant or a corrupted participant may provide a fake share to other participants in reconstruction. In previous proposed schemes [6],[13],[19], they have used one-way function, RSA, Discrete logarithm functions to keep share information in public. Their idea was choosing above mentioned functions is mostly for the purpose of verification of shares. In our scheme, we did not use any exponentiation functions, but we have used two variable one-way function for the purpose of share calculation not for the verification. Our scheme resists dealer and participants cheating behavior efficiently.Keywords
Secret Sharing, Multi Secret Sharing, Verifiable, Threshold Scheme, Hash Function, MANETs.- Stability Analysis of Discrete-Time Bidirectional Associative Neural Networks with Hysteresis
Abstract Views :199 |
PDF Views:2
Authors
Affiliations
1 Department of Mathematics, JNTU Hyderabad, IN
2 Department of Computer Science, VNRVJIET, Hyderabad, IN
1 Department of Mathematics, JNTU Hyderabad, IN
2 Department of Computer Science, VNRVJIET, Hyderabad, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 4, No 7 (2012), Pagination: 429-438Abstract
In this paper continuous hysteretic neuron model has been studied and discretized the model by using proper approximation. Sufficient condition for global exponential stability of a unique equilibrium is obtained. Motivated by the applications of bidirectional associative neural networks with hysteresis in artificial neural networks, we studied the global dynamics of bidirectional associative neural network with hysteresis. The hysteretic neural network model is envisaged to be efficient and robust for various applications such as medical image processing, military data processing, etc. Hysteretic feedback control phenomena also manage glucose vs. lactose utilization preference in Escherichia coli and ensure unidirectional cell-cycle progression in eukaryotes. The result improves the earlier publications due to the bidirectional associative memory and it removes restrictions on the neutral delays. Our result shows that after discretization of hysteretic neuron models, the network converges to a stable state and this result has been applied through numerical example. The outcomes are explicit in the sense that the criteria obtained are easily verifiable as they are expressed in terms of the parameters of the system.Keywords
Descretization, Hysteretic Neural Network, Bidirectional Associative, Global Exponential Stability.- Code based Secret Sharing Schemes for MANET
Abstract Views :174 |
PDF Views:0
Authors
Affiliations
1 Department of H&S, VNR VJIET, Hyderabad, IN
2 Department of Computer Science and Engineering, VNRVJIET, Hyderabad, IN
3 CR Rao AIMSCS, University of Hyderabad Campus, Hyderabad, IN
1 Department of H&S, VNR VJIET, Hyderabad, IN
2 Department of Computer Science and Engineering, VNRVJIET, Hyderabad, IN
3 CR Rao AIMSCS, University of Hyderabad Campus, Hyderabad, IN
Source
Indian Journal of Science and Technology, Vol 9, No 39 (2016), Pagination:Abstract
Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Shamir`s proposal is well known prominent secret sharing schemes. But it does not provide a dynamic approach to the particular application. In the same distribution process nodes may join or leave the network and able to obtain the similar capabilities as initial nodes; further, the joined nodes gain the shares (updated shares) corresponding to the secret. Two additional features of proposed system are that it allows to implement threshold operations, one for distributing secret information with other nodes and the other is using our threshold schemes in key management. Secret values sharing in MANET is computationally insecure and inconsistent because of its dynamic nature. Proposed the group key establishment protocol operations in detail and also proposed two different methods for dealing network dynamic nature including adding and removing of the nodes.Keywords
Interpolation, Key Generation, Key Management, MANETs, Threshold, Secret Sharing.- Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks
Abstract Views :115 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Science and Engineering, VNR VJIET, Hyderabad, IN
2 Sri Prakash College of Engineering, Tuni, IN
3 CRRao AIMSCS, University of Hyderabad Campus, Hyderabad, IN
1 Department of Computer Science and Engineering, VNR VJIET, Hyderabad, IN
2 Sri Prakash College of Engineering, Tuni, IN
3 CRRao AIMSCS, University of Hyderabad Campus, Hyderabad, IN