DocumentCode :
2124134
Title :
Threshold Cryptosystem Using Pell´s Equation
Author :
Sarma, KVSSRSS ; Kumar, G. Santhosh Krishna ; Avadhani, P.S.
fYear :
2011
fDate :
11-13 April 2011
Firstpage :
413
Lastpage :
416
Abstract :
This paper analyzed the basic principles of secret sharing in threshold cryptosystem and its superiority considering its application in key management. Combining secret sharing and key management, we present a threshold key management scheme based on PEC(Pell´s Equation based Cryptosystem). By utilizing secret sharing and probabilistic encryption algorithm in key generating and distributing, the scheme achieves threshold management of symmetric key and public key certificate. The scheme avoids the misuse of certificate generating and tracing by CA (Certificate Agency) members, renders effective supervision on key management. It prevents coalition attack, intruder-in-middle attack and generalized certificate forgery. We also provide an application case of the threshold key management scheme in key managing and certificate supervision, it further justify the scheme´s brevity, security, high efficiency regarding its application in such circumstances as with restricted computation ability, integrated space and limited bandwidth yet requiring for high-speed operation.
Keywords :
public key cryptography; Pell equation based cryptosystem; certificate agency; coalition attack prevention; generalized certificate forgery; intruder-in-middle attack; public key certificate; secret sharing; threshold cryptosystem; threshold key management; Interpolation; Polynomials; Public key; Zinc; Pell´s equation; Secret sharing; Threshold cryptosystem; key management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: New Generations (ITNG), 2011 Eighth International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-61284-427-5
Electronic_ISBN :
978-0-7695-4367-3
Type :
conf
DOI :
10.1109/ITNG.2011.209
Filename :
5945271
Link To Document :
بازگشت