Comparative Analysis and Implementation of Verifiable Secret Sharing Over a Single Path in VoIP Security with Reliable Time Delay

نویسنده

  • R. Shankar
چکیده

-------------------------------------------------------------------ABSTRACT---------------------------------------------------Voice over Internet Protocol (VoIP) is a new fancy and up growing technology. A major change in telecommunication industry in VoIP. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss, delay, quality and security. These factors will affects and degrade the performance and quality of a VoIP. This paper addresses the security and network delay of a VoIP Verifiable Secret Sharing algorithm over a single path with reduced time delay. The simulation results show that higher security and reduced packet delay is achieved in terms of end – to – end delay. In this work, suggests that the homomorphism of commitments is not a necessity for computational VSS in the synchronous or in the asynchronous communication setting. A new VSS schemes based merely on the definitional possessions of obligations that are approximately as good as existing VSS schemes based homomorphism commitments. Furthermore, this work has significantly lower communication complexities than their (statistical or perfect) unconditional counterparts. Thus, this proposed technique can be an excellent alternative to unconditional VSS in the future.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A NEW SECURED VoIP USING VERIFIABLE SECRET SHARING

Voice communication carried out using the Internet Protocol (IP) for the transaction is known as Voice over Internet Protocol (VoIP). Voice over Internet Protocol is a technology for communicating using “Internet protocol” instead of traditional analog systems. Some VoIP services need only a regular phone connection, while others allows making telephone calls using an Internet connection instea...

متن کامل

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

متن کامل

A SECURITY ANALYSIS IN VoIP USING HIERARCHICAL THRESHOLD SECRET SHARING

-------------------------------------------------------------------ABSTRACT---------------------------------------------------Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. VoIP provides a protected transmission of private voice data betwee...

متن کامل

A NEW SECURED VoIP USING HIERARCHICAL THRESHOLD SECRET SHARING

Voice over Internet Protocol is a category of hardware and software that enables people to use the Internet as the transmission medium for telephone calls by sending voice data in packets using IP rather than by traditional circuit transmissions of the PSTN. The transmission of real time voice data is not as easy as ordinary text data and the real time voice transmission faces lot of difficulti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015