Threshold cryptography based on asmuth-bloom secret sharing
被引:0
|
作者:
Kaya, Kamer
论文数: 0引用数: 0
h-index: 0
机构:
Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, TurkeyBilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
Kaya, Kamer
[1
]
论文数: 引用数:
h-index:
机构:
Selcuk, Ali Aydin
[1
]
Tezcan, Zahir
论文数: 0引用数: 0
h-index: 0
机构:
Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, TurkeyBilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
Tezcan, Zahir
[1
]
机构:
[1] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源:
COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS
|
2006年
/
4263卷
关键词:
D O I:
暂无
中图分类号:
TP18 [人工智能理论];
学科分类号:
081104 ;
0812 ;
0835 ;
1405 ;
摘要:
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.