A Progressive Key Administration for Block-Chain Technology with Lagrange Interpolation

PDF (595KB), PP.47-56

Views: 0 Downloads: 0


Pradeep Kumar 1,* Ajay Kumar 2 Mukesh Raj 2 Priyank Sirohi 3

1. JSS Academy of Technical Education, Noida, Uttar Pradesh, India

2. JSS Academy of Technical Education, Noida, India

3. Sir Chhotu Ram Institute of Engineering and Technology, C.C.S. University, Meerut, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2024.03.05

Received: 24 Nov. 2023 / Revised: 11 Jan. 2024 / Accepted: 18 Feb. 2024 / Published: 8 Jun. 2024

Index Terms

Block-chain, Lagrange Interpolation, Key Management, threshold value, modular arithmetic


Block chain is a computerized data set containing data (like records of monetary exchanges) that can be at the same time utilized and shared inside an enormous decentralized, openly open organization. Block chain development has been a prominent occurrence of changing the statutes of wellbeing in money related trades and information exchange. It offers an extraordinary development for data integration with security. Block chain relies upon the norms of understanding, decentralization, and cryptography for following the trust in trades. In any case, block chain security issues have continued to agitate various affiliations and early adopters. It is sure that, even the grounded block chain new organizations experience burdens in block chain security. Without a doubt, block chain innovation has seen a far-reaching adaption lately. Aside from beginning adaption into digital currencies, today it is being utilized in medical care, land, shrewd contacts, and so forth.  The ill-advised execution of innovation has been the reason for some block chain block protection concern, which can put the block chain vulnerable and can permit the aggressors to play out a few noxious exercises. To address the secrecy to the sensitive information in the Block chain organization, a proposed method namely progressive secure key administration for Block-Chain Technology with Lagrange Interpolation (PKABCLI) has been presented in this paper.

Cite This Paper

Pradeep Kumar, Ajay Kumar, Mukesh Raj, Priyank Sirohi, "A Progressive Key Administration for Block-Chain Technology with Lagrange Interpolation", International Journal of Information Engineering and Electronic Business(IJIEEB), Vol.16, No.3, pp. 47-56, 2024. DOI:10.5815/ijieeb.2024.03.05


[1]M. Alruqi, L. Hsairi, and A. Eshmawi, Secure mobile agents for patient status telemonitoring using blockchain, vol. 1, no. 1. Association for Computing Machinery, 2020.
[2]I. Ishita, D. Kulkarni, T. Semwal, and S. B. Nair, “On securing mobile agents using blockchain technology,” 2019 2nd Int. Conf. Adv. Comput. Commun. Paradig. ICACCP 2019, 2019, doi: 10.1109/ICACCP.2019.8882907.
[3]T. Zhou, J. Shen, Y. Ren, and S. Ji, “Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems,” Secur. Commun. Networks, vol. 2021, 2021, doi: 10.1155/2021/1864514.
[4]M. Naz et al., “A Secure Data Sharing Platform Using Blockchain and Interplanetary File System,” Sustain., vol. 11, no. 24, pp. 1–24, 2019, doi: 10.3390/su11247054.
[5]I. Applications, “Security Aspects of Blockchain Technology Intended for,” pp. 1–24, 2021.
[6]C. Singh, D. Chauhan, S. A. Deshmukh, S. S. Vishnu, and R. Walia, “Medi-Block record: Secure data sharing using block chain technology,” Informatics Med. Unlocked, vol. 24, no. April, p. 100624, 2021, doi: 10.1016/j.imu.2021.100624.
[7]O. Pal, B. Alam, V. Thakur, and S. Singh, “Key management for blockchain technology,” ICT Express, vol. 7, no. 1, pp. 76–80, 2021, doi: 10.1016/j.icte.2019.08.002.
[8]T. C. Hsiao, Z. Y. Wu, T. L. Chen, Y. F. Chung, and T. S. Chen, “A hierarchical access control scheme based on Lagrange interpolation for mobile agents,” Int. J. Distrib. Sens. Networks, vol. 14, no. 7, 2018, doi: 10.1177/1550147718790892.
[9]T. Salman, M. Zolanvari, A. Erbad, R. Jain, and M. Samaka, “Security services using blockchains: A state of the art survey,” IEEE Commun. Surv. Tutorials, vol. 21, no. 1, pp. 858–880, 2019, doi: 10.1109/COMST.2018.2863956.
[10]G. Zyskind, O. Nathan, and A. S. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” Proc. - 2015 IEEE Secur. Priv. Work. SPW 2015, pp. 180–184, 2015, doi: 10.1109/SPW.2015.27.
[11]N. Fotiou and G. C. Polyzos, “Decentralized name-based security for content distribution using blockchains,” Proc. - IEEE INFOCOM, vol. 2016-September, pp. 415–420, 2016, doi: 10.1109/INFCOMW.2016.7562112.
[12]A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah, and Z. Sun, “Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems,” IEEE Internet Things J., vol. 4, no. 6, pp. 1832–1843, 2017, doi: 10.1109/JIOT.2017.2740569.
[13]C. C. Chang, I. C. Lin, H. M. Tsai, and H. H. Wang, “A key assignment scheme for controlling access in partially ordered user hierarchies,” Proc. - Int. Conf. Adv. Inf. Netw. Appl., vol. 2, pp. 376–379, 2004, doi: 10.1109/aina.2004.1283826.
[14]A. Castiglione, A. De Santis, B. Masucci, F. Palmieri, A. Castiglione, and X. Huang, “Cryptographic Hierarchical Access Control for Dynamic Structures,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 10, pp. 2349–2364, 2016, doi: 10.1109/TIFS.2016.2581147.
[15]H. Tan and I. Chung, “A secure and efficient group key management protocol with cooperative sensor association in WBANs,” Sensors (Switzerland), vol. 18, no. 11, pp. 1–25, 2018, doi: 10.3390/s18113930.