Dishonest node identification for key sharing systems through distributed key generation
Loading...

Date
2013
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
IEEE Computer Society help@computer.org
Open Access Color
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
The purpose of this research is to develop more secure and faster identification of dishonest nodes for key sharing systems. Mathematical background of finding dishonest node express simple and efficient technique that can be used in the key sharing systems. With the distributed key generation each node has equal responsibility for creating distributed private key thus the identification of dishonest node becomes possible. With the identification of dishonest mode comes the recognition of legitimate and/or illegitimate parties as well. © 2013 IEEE. © 2014 Elsevier B.V. All rights reserved.
Description
Keywords
Distributed Key Generation, Private-key Generator, Proactive Verifiable Secret Sharing, Verifiable Secret Sharing, Distributed Key Generation, Key Sharing, Node Identifications, Private-key, Verifiable Secret Sharing, Information Technology, Distributed key generation, Key sharing, Node identifications, Private-key, Verifiable secret sharing, Information technology, Distributed Key Generation, Private-Key Generator, Proactive Verifiable Secret Sharing, Verifiable Secret Sharing
Fields of Science
0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
N/A
Source
7th International Conference on Application of Information and Communication Technologies AICT 2013
Volume
Issue
Start Page
1
End Page
6
PlumX Metrics
Citations
Scopus : 0
Captures
Mendeley Readers : 1
Google Scholar™


