Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation
| dc.contributor.author | Tugce Kalkavan | |
| dc.contributor.author | Ahmet Koltuksuz | |
| dc.coverage.spatial | Baku AZERBAIJAN | |
| dc.date.accessioned | 2025-10-06T16:19:30Z | |
| dc.date.issued | 2013 | |
| dc.description.abstract | the purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing systems. With the distributed key generation each node has equal responsibility for creating distributed private key thus the identification of dishonest node becomes possible. With the identification of dishonest mode comes the recognition of legitimate and/or illegitimate parties as well. | |
| dc.identifier.isbn | 978-1-4673-6419-5 | |
| dc.identifier.issn | 2378-8232 | |
| dc.identifier.uri | https://gcris.yasar.edu.tr/handle/123456789/5823 | |
| dc.language.iso | English | |
| dc.publisher | IEEE | |
| dc.relation.ispartof | 7th International Conference on Application of Information and Communication Technologies (AICT) | |
| dc.source | 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT) | |
| dc.subject | Verifiable secret sharing, private-key generator, proactive verifiable secret sharing, distributed key generation | |
| dc.title | Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation | |
| dc.type | Conference Object | |
| dspace.entity.type | Publication | |
| gdc.coar.type | text::conference output | |
| gdc.index.type | WoS | |
| oaire.citation.endPage | 193 | |
| oaire.citation.startPage | 188 | |
| relation.isOrgUnitOfPublication | ac5ddece-c76d-476d-ab30-e4d3029dee37 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | ac5ddece-c76d-476d-ab30-e4d3029dee37 |
