Abstract by anuja a sonalker on Asymmetric Key Distribution
Download 217.42 Kb. Pdf ko'rish
|
etd
LIST OF TABLES
Table 2.1 - Factorization time by Number Field Sieve. ……………..………………. 16 Table 3.1-Typical key share splitting for a single set for a private-key. ……………… 28 Table 4.1 - Effect of Threshold on key generation time. ....…………………………... 44 Table 4.2 - Key generation and Distribution timings. ..………………………………. 46 Table 4.3 - Key generation time with and without key share reuse. …..……………... 46 Table 4.4 - RMI communication overheads. …………………………………………. 47 Table 4.5 – Signature share generation time. ..………………………………………. 49 Table 4.6- Scalability of AKD for common key and system sizes. …………………... 50 vii LIST OF FIGURES Figure 2.1 - Shamir’s Secret Sharing. ……………………………………….…..…… 13 Figure 3.1 -The Client Server Basic model. …..………………………………..……. 18 Figure 3.2 – Distribution of generated key shares by Trusted Dealer. …….…………. 19 Figure 3.3 – AKD Algorithm. ………………………………………………………... 21 Figure 3.4 (a) (b) – Reduction in key space due to key share reuse. …………………. 31 Figure 3.5 -Typical Trusted Dealer Table after key generation. ..………………….... 31 Figure 4.1 - JDK RMI Structure. .……………………………………………………. 38 Figure 4.2- RMI – Distributed Application. ..………………………………………... 40 Figure 4.3- The Trusted Dealer’s private-key share table after key generation. …...... 42 Figure 4.4- Private key share tables of servers after key distribution. ………………. 42 Figure 4.5- Key generation timings vs. threshold. …………………………………… 44 Figure 4.6- Effect of key share reuse on key generation. …..………………………… 47 Figure 4.7- RMI Communication overhead. ………………….……………….……… 48 Figure 4.8- Scalability of AKD for 1024-bit key size for different system sizes. ……. 50 Figure 5.1- Dual Threshold model of Special Server. .………………………………. 53 Figure 5.2- AKD Algorithm with Dual Threshold. …………………………………... 54 |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling