Design Efficient Distributed Key Generation For Secure Network Applications over Cloud
نویسنده
چکیده
Distributed key generation cryptosystems has a major content called distributed key generation (DKG) protocol. This protocol allows number of participants of group to generate a set of keys such as private key and public key without determining some trusted participants. Only authorized subgroups of participants are capable to regenerate or implement the private key and the public key is an output in clear. Previous analysis says that the DKG protocols determine similar authority for participants. In our analysis, we take in account the problem of the DKG protocols in groups with different hierarchical structure where the authorized subsets will be classified through a HTAS (hierarchical threshold access structure) and for the begging propose we use a VHTSS (verifiable hierarchical threshold secret sharing) protocol. By analyzing references we understand that they presented new DKG protocol with hierarchical threshold access structure for discrete-logarithm-based cryptosystems. Also analysis of HTDKG protocol says that this protocol fulfills the needed security requirements. Furthermore, we have tendency to develop our HTDKG protocol for secure in front of adaptive attackers through presenting the attacker model as well as communication model. This system additionally proposed for the decrease the processing time and enhances the memory utilization by utilizing of KDC. Index Terms Public key extraction, asynchronous, cryptosystems, threshold, discrete-logarithm-based cryptosystems. ________________________________________________________________________________________________________
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملAn efficient method for cloud detection based on the feature-level fusion of Landsat-8 OLI spectral bands in deep convolutional neural network
Cloud segmentation is a critical pre-processing step for any multi-spectral satellite image application. In particular, disaster-related applications e.g., flood monitoring or rapid damage mapping, which are highly time and data-critical, require methods that produce accurate cloud masks in a short time while being able to adapt to large variations in the target domain (induced by atmospheric c...
متن کاملCommunication-Aware Traffic Stream Optimization for Virtual Machine Placement in Cloud Datacenters with VL2 Topology
By pervasiveness of cloud computing, a colossal amount of applications from gigantic organizations increasingly tend to rely on cloud services. These demands caused a great number of applications in form of couple of virtual machines (VMs) requests to be executed on data centers’ servers. Some of applications are as big as not possible to be processed upon a single VM. Also, there exists severa...
متن کاملIntegrity Auditing with Homomorphic Encryption for Dynamic Cloud with Group user Revocation
With cloud computing, data owners are motivated to outsource their data from local sites to public cloud for great flexibility and economic saving. Recently, some research consider the problem of secure and efficient public data integrity auditing for shared dynamic data. But this scheme is not secure against collusion of cloud storage server. An efficient public integrity auditing with a secur...
متن کامل