Open Access Open Access  Restricted Access Subscription or Fee Access

A New Approach: Proactive Verifiable Security Scheme Based On Threshold with Key Refreshment

Rashmi Singh, Satya Verma

Abstract


In public key infrastructure, each node has a public private key pair. Public key is used for encryption of message while private key is applied on that message to generate original data. When sender used own public key for encryption of message then he attach private key with that message and send to the receiver. There is the problem of security, how to securely move private key over the network. In this paper, we have developed refreshment protocol for providing security to the private key (private key is known as share). Refreshment protocol allows refreshing shares using different cryptography algorithm such as DES, AES and Blowfish within each node to refresh all sub share which is distributed by threshold cryptography


Keywords


Refreshment Protocol, Proactive Secret Sharing (PSS), Threshold Cryptography (TC), Cryptography Function (DES, AES and Blowfish)

Full Text:

PDF

References


T Morkel, JHP Eloff, “Encryption Techniques: Timeline Approach”, ICSA, grant number 2054024

Anoop MS, “Public Key Cryptography” in 2008

L. Ertaul and N. Chavan, “Security of Ad Hoc Networks and Threshold cryptography”, in MOBIWAC 2006.

Rajkumari Retoliya. “A Novel Approach Share Key Refreshing for Long Term Protection in Distribute Cryptography by Protective Security”. IJCSET | July 2011,Vol 1,Issue 6,290-295.

R. Canetti, R. Gennaro, A. Herzberg and D. Naor, “Proactive Security: Long-term protection against break-ins”. CryptoBytes: the technical newsletter of RSA Labs, Vol. 3, number 1 - Spring, 1997.

Levent Ertaul, Nitu Chavan “RSA Threshold Cryptography for MANNET”.

Ivan Damgard, and Jesper Buus Nielsen, “Simplified Threshold RSA with Adaptive and Proactive Security” Universiy of Aarhus,Denmark.2007

Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. Proactive RSA. In Proc. of Crypto97. 12.

P. Gemmell. “An introduction to threshold cryptography”. In Cryptobytes, Winter 97, pp. 7-12, 2000Ljiugu

Chauhan Gargi K. And H.M. Diwanji, “ Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks”, ISSN:2229-6093

Structuring Proactive Secret Sharing in Mobile Ad-hoc Network”

Boneh and M. Franklin. “Efficient generation of shared RSA keys”. In Proc. Crypto „97, pp. 425-539.

Y. Frankel, P. Gemmell, P. Mackenzie, and M. Yung. “Optimal resilience proactive public-key cryptosystems”. In Proc. 38th Annual Symp. on Foundations of Computer Science. IEEE, 1997.

A study of DES & Blowfish encryption algorithm.

Performance Evaluation of DES & Blowfish algorithm


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.