Wednesday, January 6, 2010

Threshold Ski Protocol


                          Traditional public key cryptography uses certificates to bind the users with their public keys and are considered the best alternative for key distribution, but requires to have a very involved key management process. Identity based cryptography makes the key management easier but suffers from the key escrow problem and requires secure channel to issue the private keys to the users. Key issuing protocols deal with secret key issuing (SKI) process to overcome the two problems. We present an efficient and secure key issuing protocol which enables the identity based cryptosystems to be more acceptable and applicable in the real world. In the protocol, neither key generating center nor key privacy authority can impersonate the users to obtain the private keys. Performance and security analysis are being carried out for the protocol and is shown that it is efficient and secure against replay, man-in-the-middle and insider attacks.
   Download :     Full Report (.doc)




Digg Google Bookmarks reddit Mixx StumbleUpon Technorati Yahoo! Buzz DesignFloat Delicious BlinkList Furl

2 comments: on "Threshold Ski Protocol"

sankar said...

Pleas add powerpoint presentation of this topic.

Vinay Chandran said...

If you want to perform well in a seminar, you should make your presenation of your own. Study the report well and make a simple presentation.

Post a Comment

Related Posts with Thumbnails