Threshold cryptography based on asmuth-bloom secret sharing

被引:0
|
作者
Kaya, Kamer [1 ]
Selcuk, Ali Aydin [1 ]
Tezcan, Zahir [1 ]
机构
[1] Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
来源
COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS | 2006年 / 4263卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.
引用
收藏
页码:935 / +
页数:2
相关论文
共 50 条
  • [41] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [42] Hierarchical Threshold Secret Sharing
    Tamir Tassa
    Journal of Cryptology, 2007, 20 : 237 - 264
  • [43] Hierarchical threshold secret sharing
    Tassa, T
    THEORY OF CRYTOGRAPHY, PROCEEDINGS, 2004, 2951 : 473 - 490
  • [44] Multi-Secret Sharing Visual Cryptography based on Random Grids
    Han, Yanyan
    Xu, Zhuolin
    He, Wencai
    Ge, Xiaonan
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND INTELLIGENT CONTROL (ISIC 2015), 2015, : 612 - 617
  • [45] Randomness in secret sharing and visual cryptography schemes
    De Bonis, A
    De Santis, A
    THEORETICAL COMPUTER SCIENCE, 2004, 314 (03) : 351 - 374
  • [46] Dynamic threshold secret reconstruction and its application to the threshold cryptography
    Harn, Lein
    Hsu, Ching-Fang
    INFORMATION PROCESSING LETTERS, 2015, 115 (11) : 851 - 857
  • [47] ESSVCS: An enriched secret sharing visual cryptography
    Liu, Feng
    Yan, Wei Q.
    Li, Peng
    Wu, Chuankun
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8363 : 1 - 24
  • [48] (k,n) halftone visual cryptography based on Shamir's secret sharing
    Ding Haiyang
    Li Zichen
    Bi Wei
    The Journal of China Universities of Posts and Telecommunications, 2018, (02) : 60 - 76
  • [49] Threshold changeable secret sharing with secure secret reconstruction
    Meng, Keju
    Miao, Fuyou
    Huang, Wenchao
    Xiong, Yan
    INFORMATION PROCESSING LETTERS, 2020, 157
  • [50] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623