Threshold cryptography based on asmuth-bloom secret sharing

被引:0
|
作者
Kaya, Kamer [1 ]
Selcuk, Ali Aydin [1 ]
Tezcan, Zahir [1 ]
机构
[1] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS | 2006年 / 4263卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.
引用
收藏
页码:935 / +
页数:2
相关论文
共 50 条
  • [21] A key based secure threshold cryptography for secret image
    Naskar, Prabir Kr.
    Khan, Hari Narayan
    Chaudhuri, Atal
    International Journal of Network Security, 2016, 18 (01) : 68 - 81
  • [22] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420
  • [23] An authentication protocol based on threshold secret sharing
    Thuc, Nguyen Dinh
    Bao, Tran Ngoc
    Proceedings of the ISSAT International Conference on Modeling of Complex Systems and Environments, Proceedings, 2007, : 96 - 100
  • [24] Secret Sharing Using Visual Cryptography
    Chin-Chen Chang
    Jung-San Lee
    Journal of Electronic Science and Technology, 2010, 8 (04) : 289 - 299
  • [25] A Visual Cryptography based system for sharing multiple secret images
    Chen, Shang-Kuan
    PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY AND ARTIFICIAL VISION (ISCGAV'-07), 2007, : 113 - +
  • [26] A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography
    Sun, Hua
    Zheng, Xuefeng
    Yu, Yike
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 666 - 669
  • [27] Changeable essential threshold secret image sharing scheme with verifiability using bloom filter
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    Farahi, Seyed Taghi
    Noorallahzadeh, Mohommad Hosein
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (20) : 58745 - 58781
  • [28] Key Sharing Scheme based on One Weighted Threshold Secret Sharing
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryou, JaeCheo
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 317 - 320
  • [29] Blockchain Data Sharing Query Scheme based on Threshold Secret Sharing
    Chen, Lu
    Zhang, Xin
    Sun, Zhixin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [30] Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme
    Sarkar, S.
    Kisku, B.
    Misra, S.
    Obaidat, M. S.
    2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, : 258 - +