A Fully Distributed Proactively Secure Threshold-Multisignature Scheme
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP

Posts: 226
Joined: Jul 2009
28-08-2009, 02:03 AM

A Fully Distributed Proactively Secure Threshold-Multisignature Scheme

Abstract”Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schemes to yield a signature scheme that allows a threshold (t) or more group members to collaboratively sign an arbitrary message. In contrast to threshold group signatures, the individual signers do not remain anonymous, but are publicly identifiable from the information contained in the valid threshold-multisignature. The main objective of this paper is to propose such a Secure and efficient threshold-multisignature scheme. The paper uniquely defines the fundamental properties of threshold multisignature schemes and shows that the proposed scheme satisfies these properties and eliminates the latest attacks to which other similar schemes are subject. The efficiency of the proposed scheme is analyzed and shown to be superior to its counterparts.

The paper also proposes a discrete logarithm based distributed-key management infrastructure (DKMI), which consists of a round optimal, publicly verifiable, distributed-key generation (DKG) protocol and a one round, publicly verifiable, distributed-key redistribution/ updating (DKRU) protocol. The round optimal DKRU protocol solves a major problem with existing secret redistribution/updating Schemes by giving group members a mechanism to identify malicious or faulty share holders in the first round, thus avoiding multiple Protocol executions.

Processor : Any Processor above 500 Mhz.
Ram : 128Mb.
Hard Disk : 10 Gb.
Compact Disk : 650 Mb.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.

Operating System : Windows 2000 server Family.
Software : JDK 1.5
Data Bases : MS SQL-Server 2000
Technologies : Java
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: efficient key management for threshold, ppt on proactively threshold multi signature scheme, a fully distributed proactively secure threshold multisignature scheme coding,
Popular Searches: threshold extension, fully project report in robotics pdf, iris recognition variable threshold, proactively definition, fully doccumentation of online banking project, efficient key management for threshold, spatially adaptive wavelet threshold,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,728 09-12-2014, 09:25 PM
Last Post: Guest
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 712 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering report seminar projects maker 0 450 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Energy-Sustainable Framework and Performance Analysis of Power Scheme pdf seminar projects maker 0 258 12-09-2013, 02:51 PM
Last Post: seminar projects maker
  Kalman Filter-Based Distributed Predictive Control of Large-Scale Multi-Rate pdf study tips 0 358 09-09-2013, 03:32 PM
Last Post: study tips
Last Post: study tips
  Secure Access for MANET Using Authorization Enforcement Facility Report study tips 0 332 27-08-2013, 12:56 PM
Last Post: study tips
  Toward publicly auditable secure cloud data storage services Abstract study tips 0 320 16-08-2013, 04:59 PM
Last Post: study tips
  A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Abstract study tips 0 345 16-08-2013, 04:57 PM
Last Post: study tips
  A New Approach for Secure Data Transfer based on Wavelet Transform Report study tips 0 382 02-08-2013, 04:15 PM
Last Post: study tips