Asymmetric Key Distribution

نویسندگان

  • Anuja A Sonalker
  • Gregory T. Byrd
  • ANUJA A. SONALKER
  • Peng Ning
  • Anuja Sonalker
چکیده

Currently, in Threshold Public Key Systems key shares are generated uniformly and distributed in the same manner to every participant. We propose a new scheme, Asymmetric Key Distribution (AKD), in which one share server is provided with a larger, unequal chunk of the original secret key. Asymmetric Key Distribution is a unique scheme for generating and distributing unequal shares via a Trusted Dealer to all the registered peers in the system such that without the combination of the single compulsory share from the Special Server no transaction can be completed. This application is aimed for circumstances where a single party needs to co-exist within a group of semi-trusted peers, or in a coalition where every entity should have a choice to participate and one of the entities needs to be privileged with more powers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Higher moments portfolio Optimization with unequal weights based on Generalized Capital Asset pricing model with independent and identically asymmetric Power Distribution

The main criterion in investment decisions is to maximize the investors utility. Traditional capital asset pricing models cannot be used when asset returns do not follow a normal distribution. For this reason, we use capital asset pricing model with independent and identically asymmetric power distributed (CAPM-IIAPD) and capital asset pricing model with asymmetric independent and identically a...

متن کامل

Mobile Agent Based Key Distribution Approach for Clustered Wireless Sensor Networks

Key management is very crucial need in WSN to protect data and secure communications. One of the Key distribution solutions in WSN is symmetric key cryptography which is relatively faster and energy efficient. However, it cannot bestow high level of security due to difficulty in secure key management. Nevertheless, Asymmetric key cryptography can enhance network security but it also causes ener...

متن کامل

Asymmetric Uniform-Laplace Distribution‎: ‎Properties and Applications

‎The goal of this study is to introduce an Asymmetric Uniform-Laplace (AUL) distribution‎. ‎We present a detailed theoretical description of this distribution‎. ‎We try to estimate the parameters of AUL distribution using the maximum likelihood method‎. ‎Since the likelihood approach results in complicated forms‎, ‎we suggest a bootstrap-based approach for es...

متن کامل

Quantum Asymmetric-Key Cryptosystem Secure Against A Computationally Unbounded Adversary

In this paper we propose a quantum asymmetric-key cryptosystem, which does not rely on a computationally hard problem for security, but on uncertainty principles of quantum mechanics, thus obtaining security against a computationally unbounded adversary. We first propose a universally composable security criteria for quantum asymmetric-key cryptosystems by adapting the universally composable se...

متن کامل

Bayesian Estimation for the Pareto Income Distribution under Asymmetric LINEX Loss Function

The use of the Pareto distribution as a model for various socio-economic phenomena dates back to the late nineteenth century. In this paper, after some necessary preliminary results we deal with Bayes estimation of some of the parameters of interest under an asymmetric LINEX loss function, using suitable choice of priors when the scale parameter is known and unknown. Results of a Monte C...

متن کامل

Multi-Level Dynamic Key Management for Scalable Wireless Sensor Networks with UAV

Wireless Sensor Networks (WSNs) are more vulnerable to security attacks than wired networks because of their wireless and dynamic nature. In today’s WSNs, the sensor nodes act not only as routers but also as communication endpoints, and they are also responsible for the security of the messages. Therefore, it is important to define whether an incoming message originates from a trustworthy node ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002