threshold multisignature source code
#1

hello sir/ madam,

I'm a research scholar. Presently im doing my research on multi signature. i got code for this project but all i want is to help me to simulate this project.. Its relly very urgent. so plz revert me asap.
plz contact me : dhivya.asaithambi13[at]gmail.com

Thank you,
Reply
#2

threshold multisignature source code

Threshold Multi signature Scheme Project:
The main aim of this abstract is presenting secure and efficient way of Threshold multi signature scheme. The fundamental properties are defined in this scheme consist the all properties of the multi signature and thresh hold group signatures.

Existing System:

For the generation of digital signature more shareholders are required. The shareholders must contribute equally to produce valid digital signatures.The scheme consist the all properties of the multi signature and thresh hold group signatures. Existing multi signature schemes are single-signed.

Proposed System:

The system proposes new threshold multi signal scheme without Trusted Third party. It is based on the based on a round optimal, publicly verifiable DKG protocol. The protocol can be easily incorporated and maintained. It is very secure.

Modules:

The modules that are included in this project are

Signature
Signature Generation

Signature Verification

Cryptography
Encryption

Decryption

Message Transmission
Unicasting

Multicasting

Signature Generation: The signature is generated by long-term private key. It is generated for the group of members. The encryption for the protocol participant is performed using an appropriate publicly verifiable encryption scheme. The generated signature is broadcasted to all the members.

Signature Verification: The member’s group signature is collected for generation of signatures. The individual signatures are authenticated by the clerk. Invalidation can be occurred due to participant’s signatures. The protocol can be aborted due to less number of participants.

Cryptography

Encryption: The encryption process is used to encrypt the secret messages and they are converted to cipher form.

Decryption: The original message is decrypted by the key by this the original message can be retrieved.

Message Transmission:

The encrypted message is transferred to the group members. This message will be decrypted at other end by the key.This module having two sub modules they are

i) Unicasting and

ii) Multicasting.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: diadvantages of secure multisignature, threshold multisignature scheme ppt, video for execute secure multisignature generation for group communication, multisignature ppt, threshold multisignature scheme source code, secure multisignature generation for group communication pdf, secure multisignature generation for group communication,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  simple java rmi chat application source code 2 19,194 20-07-2018, 12:08 PM
Last Post: Guest
  authentication schemes for session passwords using color and images project source code 2 2,237 03-02-2018, 09:35 AM
Last Post: Nischithnash
  free download source code for online movie ticket booking in java 2 18,704 15-08-2017, 03:21 PM
Last Post: Morshed
  source code for rsa encryption and decryption in java 2 8,015 29-05-2017, 04:21 PM
Last Post: Meghna Jadhav
  download liver tumor ct scan image in matlab with source code 4 8,064 21-05-2017, 09:54 PM
Last Post: abdulrahmanmashaal
  online cab booking source code in asp net 3 7,940 11-05-2017, 10:39 AM
Last Post: jaseela123d
Thumbs Up online catering management system on php with report and source code and ppt 4 8,800 29-04-2017, 10:59 AM
Last Post: jaseela123d
  source code for task scheduling using genetic algorithm using java 2 8,526 11-04-2017, 08:31 PM
Last Post: Guest
  automatic timetable generator source code vb 1 7,605 07-04-2017, 12:31 PM
Last Post: jaseela123d
Thumbs Up source code of online payment system using steganography and visual cryptography 3 8,507 06-04-2017, 09:56 AM
Last Post: jaseela123d

Forum Jump: