Ultra Secured and Authentic Key Distribution Protocol Using a Novel Secret Sharing Technique

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
"Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary the key cannot be reconstructed unless a predefined set of shares are been accumulated. The earlier schemes available in literature lead to high computational complexity during both sharing and reconstructing."
Download Now

Find By Topic