Threshold cryptography based on asmuth-bloom secret sharing

被引:0
|
作者
Kaya, Kamer [1 ]
Selcuk, Ali Aydin [1 ]
Tezcan, Zahir [1 ]
机构
[1] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS | 2006年 / 4263卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.
引用
收藏
页码:935 / +
页数:2
相关论文
共 50 条