Paper Title

Design Efficient Distributed Key Generation For Secure Network Applications over Cloud

Authors

  • Ms. Pratima Popat Gutal

Keywords

Public key extraction, asynchronous, cryptosystems, threshold , discrete - logarithm - based cryptosystems .

Abstract

​Distributed key generation cryptosystems has a major content called distributed key generation (DKG) protocol. This protocol allows number of participants of group to generate a set of keys such as private key and public key without determining some trusted participants. Only authorized subgroups of participants are capable to regenerate or implement the private key and the public key is an output in clear. Previous analysis says that the DKG protocols determine similar authority for participants. In our analysis, we take in account the problem of the DKG protocols in groups with different hierarchical structure where the authorized subsets will be classified through a HTAS (hierarchical threshold access structure) and for the begging propose we use a VHTSS (verifiable hierarchical threshold secret sharing) protocol. By analyzing references we understand that they presented new DKG protocol with hierarchical threshold access structure for discrete-logarithm-based cryptosystems. Also analysis of HTDKG protocol says that this protocol fulfills the needed security requirements. Furthermore, we have tendency to develop our HTDKG protocol for secure in front of adaptive attackers through presenting the attacker model as well as communication model. This system additionally proposed for the decrease the processing time and enhances the memory utilization by utilizing of KDC.

Article Type

Published

How To Cite

Ms. Pratima Popat Gutal. "Design Efficient Distributed Key Generation For Secure Network Applications over Cloud".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.4, Issue 3, pp.237-243, URL :https://rjwave.org/ijedr/papers/IJEDR1603040.pdf

Issue

Volume 4 Issue 3 

Pages. 237-243

Article Preview