Combining the Pre-Distribution Key Protocol with the Threshold Scheme
2021 ◽
Vol 2096
(1)
◽
pp. 012008
Keyword(s):
Abstract In the article, the protocol for key pre-distribution using a threshold scheme is proposed. The Blom pre-distribution scheme is used as the basis. Shamir secret sharing scheme is used for threshold scheme. A polynomial of three variables is used to form key materials. Messaging between users is required to generate a key. The threshold scheme (3,4) is used to calculate the encryption key.
2020 ◽
Vol 7
(2)
◽
pp. 018-022
2021 ◽
Vol 2
(64)
◽
pp. 13-17
2020 ◽
Vol 15
(6)
◽
2006 ◽
pp. 103-117
◽