z-logo
open-access-imgOpen Access
Combining the Pre-Distribution Key Protocol with the Threshold Scheme
Author(s) -
С. В. Белим,
S. Yu. Belim
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2096/1/012008
Subject(s) - scheme (mathematics) , key (lock) , key distribution , computer science , protocol (science) , secret sharing , basis (linear algebra) , quantum key distribution , encryption , computer network , theoretical computer science , algorithm , mathematics , cryptography , public key cryptography , computer security , physics , medicine , mathematical analysis , photon , alternative medicine , geometry , pathology , quantum mechanics
In the article, the protocol for key pre-distribution using a threshold scheme is proposed. The Blom pre-distribution scheme is used as the basis. Shamir secret sharing scheme is used for threshold scheme. A polynomial of three variables is used to form key materials. Messaging between users is required to generate a key. The threshold scheme (3,4) is used to calculate the encryption key.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here