Now showing items 1-2 of 2

    • Threshold cryptography with Chinese remainder theorem 

      Kaya, Kamer (Bilkent University, 2009)
      Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements ...
    • A verifiable secret sharing scheme based on the chinese remainder theorem 

      Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2008-12)
      In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure by an attack where the dealer ...