A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
#1

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Abstract”Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold ðtÞ or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. The main objective of this paper is to propose such a

secure and efficient threshold-multisignature scheme. The paper uniquely defines the fundamental properties of thresholdmultisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject. The efficiency of the proposed scheme is analyzed and shown to be superior to its counterparts. The paper also proposes a discrete logarithm based distributed-key management infrastructure (DKMI), which consists of a round optimal, publicly verifiable, distributed-key generation (DKG) protocol and a one round, publicly verifiable, distributed-key redistribution/updating (DKRU) protocol. The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating schemes by giving group members a mechanism to identify malicious or faulty share holders in the first round, thus avoiding multiple protocol executions.

Technology to use: JAVA/ 2007
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: multisignature ppt, free project download of multisignature, threshold enterprises, what is threshold multisignature scheme in wikipedia, ppt on proactively threshold multi signature scheme, shamir threshold scheme, fully distributed proactively secure threshold multisignature project,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
A Fully Distributed Proactively Secure Threshold-Multisignature Scheme - by electronics seminars - 13-01-2010, 07:57 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 914 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,929 25-02-2015, 07:17 AM
Last Post: Guest
  Secure Multipart File Transfer projectsofme 4 3,767 07-03-2013, 05:16 PM
Last Post: Guest
  distributed cache updating for the dynamic source routing protocol project report tiger 4 3,000 05-03-2013, 02:22 PM
Last Post: Guest
  DISTRIBUTED MOBILITY MANAGEMENT FOR TARGET TACKING IN MOBILE SENSOR NETWORKS computer science technology 4 3,939 22-02-2013, 03:05 PM
Last Post: seminar details
  Dynamic Load Balancing Distributed System in The Presence of Delays mechanical engineering crazy 1 2,670 30-10-2012, 01:18 PM
Last Post: seminar details
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 1 1,968 29-10-2012, 05:31 PM
Last Post: seminar details
  Improved Offline Signature Verification Scheme Using Feature Point Extra ction Method seminar class 1 3,099 24-10-2012, 01:27 PM
Last Post: seminar details
  A DYNAMIC EN-ROUTE FILTERING SCHEME FOR DATA REPORTING IN WIRELESS SENSOR NETWORKS project topics 7 3,728 22-06-2012, 12:34 PM
Last Post: seminar details
  distributed applications using RMI-Java model. seminar class 1 1,478 31-05-2012, 12:29 AM
Last Post: Guest

Forum Jump: