Document Outline - Anuja A Sonalker
- Asymmetric Key Distribution.
- ASYMMETRIC KEY DISTRIBUTION
- North Carolina State University
- Dr. Gregory T. Byrd, Chair of Advisory Committee
- Dr. Peng Ning
- Dr. Ken Vu
- Chapter 1
- Chapter 2
- Introduction to Threshold Cryptography
-
- 2.8 Breaking the Algorithm
- 2.8.1 Factoring N
- Chapter 3
- Asymmetric Key Distribution
- 3.7 Secret share generation
-
- 3.10 Security Concerns
- 3.10.1 Breaking the system
- Chapter 4
- Implementation
- 4.1 Communication Mechanisms in Java
- All the share servers and the Special Server register themselves by binding with the registry. This way, any server can look up another server in the registry and set up communication with it.
- Chapter 5
- Dual Threshold Approach
-
- Fig 5.2: Asymmetric Key Distribution Algorithm with Dual Threshold.
- 5.3 Advantages
- Chapter 6
Do'stlaringiz bilan baham: |