![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
A New Approach:Proactive Verifiable Security Scheme Based On Threshold with Key Refreshment
Subscribe/Renew Journal
In public key infrastructure, each node has a public private key pair. Public key is used for encryption of message while private key is applied on that message to generate original data. When sender used own public key for encryption of message then he attach private key with that message and send to the receiver. There is the problem of security, how to securely move private key over the network. In this paper, we have developed refreshment protocol for providing security to the private key (private key is known as share). Refreshment protocol allows refreshing shares using different cryptography algorithm such as DES, AES and Blowfish within each node to refresh all sub share which is distributed by threshold cryptography.
Keywords
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 281
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 1