Proactive Approach: Proactive Security is Based on Threshold and Key Refreshment is Performed by Different Cryptography Function

Download Now
Provided by: International Journal of Computer Science & Engineering Technology (IJCSET)
Topic: Security
Format: PDF
The security of public key cryptosystems relies heavily on the secrecy of the private key. Thus such cryptosystems should be augmented with methods for protecting the secret key while providing continuous availability of the system. A naive solution may be to share the private key using a proactive secret sharing scheme. This solution provides the necessary protection as long as the key is not used. However, in order to generate a signature the private key would need to be reconstructed in a single site, thus losing the advantage of distribution: A single break-in to this site will compromise the security.
Download Now

Find By Topic