threshold cryptography
Recently Published Documents


TOTAL DOCUMENTS

88
(FIVE YEARS 3)

H-INDEX

12
(FIVE YEARS 0)

Author(s):  
Anirban Bhowmik ◽  
Sunil Karforma ◽  
Joydeep Dey

During the transmission over the Internet, protection of data and information is an important issue. Efficient cryptographic techniques are used for protection but everything depends on the encryption key and robustness of encryption algorithm. Threshold cryptography provides the development of reliable and strong encryption and key management machine which can reconstruct the message even in the case of destruction of some particular numbers of shares and at the opposite the data cannot be reconstructed unless an allowable set of shares are been gathered. The earlier techniques available in literature result in high computational complexity in the course of both sharing and reconstructing of message. Our method employs a brand new easy protecting technique based totally on unit matrix. The simple AND operation is used for percentage generation and reconstruction can be finished by way of easy ORing the stocks with threshold cost. We are proposing a sharing approach in conjunction with conventional cryptography technique for key control to make the key greater sturdy and for encryption we have used a session key the use of the idea of recurrence relation and DNA series Different types of experimental results confirm authenticity, confidentiality, integrity and acceptance of our technique.



Author(s):  
Keping Yu ◽  
Liang Tan ◽  
Caixia Yang ◽  
Kim-Kwang Raymond Choo ◽  
Ali Kashif Bashir ◽  
...  


Author(s):  
Prabha Elizabeth Varghese ◽  


Author(s):  
Arnold Mashud Abukari ◽  
Edem Kwedzo Bankas ◽  
Mohammed Iddrisu Muniru




IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 149080-149096
Author(s):  
Zhen Wang ◽  
Zhaofeng Ma ◽  
Shoushan Luo ◽  
Hongmin Gao


Sign in / Sign up

Export Citation Format

Share Document