Now showing items 1-1 of 1

    • Threshold cryptography based on Asmuth–Bloom secret sharing 

      Kaya, K.; Selçuk, A. A. (Elsevier Inc., 2007-10-01)
      In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosysterns. To the ...