AUTHENTICATED GROUP KEY TRANSFER IMPLEMENTATION PROTOCOL BASED ON SECRET SHARING.
Main Article Content
Article Sidebar
Abstract
A secret sharing scheme is a method which distributes shares of a secret to a set of participants in such a way that only specified groups of participants can reconstruct the secret by poling their shares. Secret sharing is related to key management and key distribution. These problems are common to all crypto systems. Secret sharing is also used in multi-party secure protocols. Future, secret sharing schemes have natural applications in access control and cryptographic key initialization. Key transfer protocols rely on a mutually trusted key generation center (KGC) to select session keys and transport session keys to all communication entities secretly.
Article Details
COPYRIGHT AGREEMENT AND AUTHORSHIP RESPONSIBILITY
 All paper submissions must carry the following duly signed by all the authors:
“I certify that I have participated sufficiently in the conception and design of this work and the analysis of the data (wherever applicable), as well as the writing of the manuscript, to take public responsibility for it. I believe the manuscript represents valid work. I have reviewed the final version of the manuscript and approve it for publication. Neither has the manuscript nor one with substantially similar content under my authorship been published nor is being considered for publication elsewhere, except as described in an attachment. Furthermore I attest that I shall produce the data upon which the manuscript is based for examination by the editors or their assignees, if requested.â€