The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Secret sharing can improve the security and robustness of a system. So far, research on secret sharing without a dealer has been mainly focused on threshold signature, there are a few studies on threshold encryption. We put forward a new threshold encryption scheme without a dealer based on Chinese Remainder Theorem (CRT). To prevent the “authority deceive”, no dealer is needed and the secret shares...
The development of three modular Rabin's encryption algorithm with using ordinary integer and modified perfect forms of the system of residual classes is presented in this paper. This method takes precedence over classic in choosing modules of the same order in sustainability by increasing the block of plaintext for encryption. New methods for implementation of major labor-intensive operations of...
Providing security for Dynamic Cluster based Mobile Ad-hoc networks (MANET) is a vital task to improve network security with less compromising mobility and with reduced dedicated Data occupancy. Key generation, distribution and authentication are major tasks of a key management system. A flexible and strong model is required to handle key management since dynamic ad-hoc networks are more prone to...
With the emergence of diverse group-based services, multiple multicast groups are likely to coexist in a single network, and users may subscribe to multiple groups simultaneously. However, the existing group key management (GKM) schemes, aiming to secure communication within a single group, are not suitable in multiple multicast group environments because of inefficient use of keys, and much larger...
This paper proposes a new weighted threshold signature based on Iftene's general secret sharing scheme and the RSA threshold signature, which is itself based on the Chinese reminder theorem. In our scheme, group members are divided into different subgroups, and a positive weight is associated to each subgroup, where all members of the same subgroup have the same weight. The group signature can be...
Kerberos is a widely-adopted network authentication protocol, which provides secure authentication service based on the reliable third-party. By exploiting a shared key, Kerberos ensures the confidentiality and integrity for a session. Kerberos, an authentication protocol based on symmetric cryptography system, has some inherent security flaws, such as undeniability, difficulty in key exchange, inability...
Some variants of RSA, such as CRT-RSA, multifactor RSA, and rebalanced RSA, are desiged to speed up RSA decryption or encryption. In this work, the authors present four schemes, where the scale of the public key and the private key could be chosen by the user. For a 1024-bit modulus, the encryption of Scheme I and Scheme III are at least 4.3 times faster than that of in the original rebalanced CRT-RSA,...
A threshold multi-secret sharing scheme against cheating among weighted participants of special access right based on Chinese remainder theorem and LUC cryptosystem is introduced , it permits that multiple secrets be shared in one secret sharing session. The sub-secret of every participant can be used many times, and the secrets can be renewed without renewing the sub-secrets of the participants....
This paper proposes a scheme to provide security to dynamic multicast VoIP systems efficiently. Security is usually provided by encrypting the media packets sent from a user to other users with the help of a shared key called the session encryption key (SEK). The most time consuming process in a dynamic multicast VoIP environment is the group key management. Whenever there is a change in the group...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.