International Journal of Computer Science & Engineering Technology (IJCSET)
The security of public key cryptosystems relies heavily on the secrecy of the private key. Thus such cryptosystems should be augmented with methods for protecting the secret key while providing continuous availability of the system. A naive solution may be to share the private key using a proactive secret sharing scheme. This solution provides the necessary protection as long as the key is not used. However, in order to generate a signature the private key would need to be reconstructed in a single site, thus losing the advantage of distribution: A single break-in to this site will compromise the security.