Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation

dc.contributor.author Tugce Kalkavan
dc.contributor.author Ahmet Koltuksuz
dc.coverage.spatial Baku AZERBAIJAN
dc.date.accessioned 2025-10-06T16:19:30Z
dc.date.issued 2013
dc.description.abstract the purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing systems. With the distributed key generation each node has equal responsibility for creating distributed private key thus the identification of dishonest node becomes possible. With the identification of dishonest mode comes the recognition of legitimate and/or illegitimate parties as well.
dc.identifier.isbn 978-1-4673-6419-5
dc.identifier.issn 2378-8232
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/5823
dc.language.iso English
dc.publisher IEEE
dc.relation.ispartof 7th International Conference on Application of Information and Communication Technologies (AICT)
dc.source 2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT)
dc.subject Verifiable secret sharing, private-key generator, proactive verifiable secret sharing, distributed key generation
dc.title Dishonest Node Identification for Key Sharing Systems through Distributed Key Generation
dc.type Conference Object
dspace.entity.type Publication
gdc.coar.type text::conference output
gdc.index.type WoS
oaire.citation.endPage 193
oaire.citation.startPage 188
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files