Privileged authenticity in reconstruction of digital encrypted shares

Joydeep Dey, Anirban Bhowmik, Arindam Sarkar, Sunil Karforma

Abstract


Efficient message reconstruction mechanism depends on the entire partial shares received in random manner. This paper proposed a technique to ensure the authenticated accumulation of shares based on the privileged share. Threshold number of received shares inclusive of the privileged share, were being accumulated together to validate the original message. Although attaining threshold number of shares or more excluding the privileged share, it would not be possible to reconstruct the original message. Encryptional procedure has been put into the desired partial shares to confuse the evaesdroppers. Decisive parameter termed as hash tag has been extracted from the cumulative shares and bitwise checking procedure has been carried out. In appearance of first mismatch, rests of the checking bits were ignored, as test case put under failure transaction. Different statistical tests namely floating frequency, entropy value have proved the robustness of the proposed technique. Thus, extensive experiments were conducted to evaluate the security and efficiency with better productivity.

Keywords


Authentication; Entropy; Floating frequency; Privileged recipient; Threshold

Full Text:

PDF


DOI: http://doi.org/10.11591/ijai.v8.i2.pp175-180

Refbacks

  • There are currently no refbacks.


View IJAI Stats

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.