
Combining the Pre-Distribution Key Protocol with the Threshold Scheme
Author(s) -
С. В. Белим,
S. Yu. Belim
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2096/1/012008
Subject(s) - scheme (mathematics) , key (lock) , key distribution , computer science , protocol (science) , secret sharing , basis (linear algebra) , quantum key distribution , encryption , computer network , theoretical computer science , algorithm , mathematics , cryptography , public key cryptography , computer security , physics , medicine , mathematical analysis , photon , alternative medicine , geometry , pathology , quantum mechanics
In the article, the protocol for key pre-distribution using a threshold scheme is proposed. The Blom pre-distribution scheme is used as the basis. Shamir secret sharing scheme is used for threshold scheme. A polynomial of three variables is used to form key materials. Messaging between users is required to generate a key. The threshold scheme (3,4) is used to calculate the encryption key.