Key Issuing Scheme For Communication In Peer To Peer Networks
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks. In this paper we propose a secure key issuing scheme for P2P networks using IBC. We are present an IBC infrastructure, which consists of setup phase, a peer registration solution using Shamir’s (k, n) secret sharing scheme, and a secure key issuing scheme, which adopts key generate center (KGC) and key privacy authorities (KPAs) to issue private keys to peers or nodes securely, in order to enable the IBC systems to be more acceptable and applicable in real-world P2P network.This enables the IBC systems to be more acceptable and applicable in real-world P2Pnetworks.
Authors and Affiliations
Anantha D N, Bhimashankar R, Girisha A V, Mahalakshmi M C, Asha G R
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Cloud computing is renowned as an alternative to Traditional information technology due to its inherent resourcesharing and low-maintenance characteristics. With the nature of low preservation, cloud computing provides a...
Differential Protection of Power Transformer Using Simulink
In this research work we propose a simple and effective technique based on the Clark’s transformation. Which avoiding the mal-operation of differential protection relays during inrush currents and trip signal generated...
An Experimental Study on Self Compacting Concrete with Marble Powder and Cement Kiln Dust as Mineral Admixtures
In this experiment study of self compacting concrete, Ordinary Portland Cement is partial replacement by mineral adMIXtures like marble powder and cement kiln dust. If only Ordinary Portland Cement is used in self compa...
A Review Paper on Earth Tube Heat Exchanger
The aim of this work is to investigate by modeling the possibility of reducing the operational energy of a typical house without negatively affecting its embodied energy. This is done through consideration of different...
Opportunistic Transmission Scheduling Using Medium Access Control Protocol
Mobile underwater networks with acoustic communications are confronted with several unique challenges such as long propagation delay, high transmission power utilization, and node mobility. Propose the delay-aware oppor...