IAES International Journal of Artificial Intelligence (IJ-AI)
Vol 8, No 2: June 2019

Privileged authenticity in reconstruction of digital encrypted shares

Joydeep Dey (M.U.C. Women’s College)
Anirban Bhowmik (Cyber Research & Training Institute)
Arindam Sarkar (Ramakrishna Mission Vidyamandira)
Sunil Karforma (The University of Burdwan)



Article Info

Publish Date
01 Jun 2019

Abstract

Efficient message reconstruction mechanism depends on the entire partial shares received in random manner. This paper proposed a technique to ensure the authenticated accumulation of shares based on the privileged share. Threshold number of received shares inclusive of the privileged share, were being accumulated together to validate the original message. Although attaining threshold number of shares or more excluding the privileged share, it would not be possible to reconstruct the original message. Encryptional procedure has been put into the desired partial shares to confuse the evaesdroppers. Decisive parameter termed as hash tag has been extracted from the cumulative shares and bitwise checking procedure has been carried out. In appearance of first mismatch, rests of the checking bits were ignored, as test case put under failure transaction. Different statistical tests namely floating frequency, entropy value have proved the robustness of the proposed technique. Thus, extensive experiments were conducted to evaluate the security and efficiency with better productivity.

Copyrights © 2019






Journal Info

Abbrev

IJAI

Publisher

Subject

Computer Science & IT Engineering

Description

IAES International Journal of Artificial Intelligence (IJ-AI) publishes articles in the field of artificial intelligence (AI). The scope covers all artificial intelligence area and its application in the following topics: neural networks; fuzzy logic; simulated biological evolution algorithms (like ...