Threshold cryptography based on asmuth-bloom secret sharing

被引:0
|
作者
Kaya, Kamer [1 ]
Selcuk, Ali Aydin [1 ]
Tezcan, Zahir [1 ]
机构
[1] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS | 2006年 / 4263卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.
引用
收藏
页码:935 / +
页数:2
相关论文
共 50 条
  • [31] A Threshold Secret Sharing Technique Based on Matrix Manipulation
    Porwal, Shardha
    Mittal, Sangeeta
    ADVANCEMENTS IN MATHEMATICS AND ITS EMERGING AREAS, 2020, 2214
  • [32] Threshold quantum secret sharing based on single qubit
    Lu, Changbin
    Miao, Fuyou
    Meng, Keju
    Yu, Yue
    QUANTUM INFORMATION PROCESSING, 2018, 17 (03)
  • [33] Threshold visual secret sharing based on Boolean operations
    Kumar, Sachin
    Sharma, Rajendra K.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 653 - 664
  • [34] AN IMPROVED SECRET SHARING USING XOR-BASED VISUAL CRYPTOGRAPHY
    Purushothaman, Vandana
    Sreedhar, Sreela
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [35] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [36] Threshold quantum secret sharing based on single qubit
    Changbin Lu
    Fuyou Miao
    Keju Meng
    Yue Yu
    Quantum Information Processing, 2018, 17
  • [37] Threshold Signature Scheme Based on Modular Secret Sharing
    Xie, Qi
    Shen, Zhonghua
    Yu, Xiuyuan
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
  • [38] CRT based threshold multi secret sharing scheme
    Subba Rao, Y.V.
    Bhagvati, Chakravarthy
    International Journal of Network Security, 2014, 16 (04) : 249 - 255
  • [39] A Lattice-Based Threshold Secret Sharing Scheme
    Khorasgani, Hamidreza Amini
    Asaad, Saba
    Eghlidos, Taraneh
    Aref, Mohammadreza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 173 - 179
  • [40] Hierarchical threshold secret sharing
    Tassa, Tamir
    JOURNAL OF CRYPTOLOGY, 2007, 20 (02) : 237 - 264