期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2012
卷号:3
期号:2
页码:593-595
语种:English
出版社:Ayushmaan Technologies
摘要:Share refreshing must tolerate missing sub shares and erroneous sub shares from compromised servers. A compromised server may not generate any sub shares. However, as long as correct servers agree on the set of sub shares to use, they can generate new shares. Proactive security system allows refreshing all shares. Refreshment protocol allows refreshing all shares by using AES, DES and blowfish cryptography function which is available on the server. To keep a protocol consistency, all share holders must cooperative with its procedure. Threshold cryptography is a novel approach for distribution of trust. Firstly we generate trust by using threshold cryptography and then apply refreshment protocol on it’s for refreshing key. In this paper, we have developed refreshment protocol within each node to refresh all sub share which is distributed by threshold cryptography and also threshold value is decided for each and every node because refreshment of key is depend on it.