Now showing items 1-5 of 5

    • Generalized ID-based blind signatures from bilinear pairings 

      Kalkan, S.; Kaya, K.; Selçuk, A.A. (2008)
      Blind signature schemes provide the feature that a user is able to get a signature without giving the actual message to the signer. Recently a number of ID-based blind signatures have been proposed. In this paper, we ...
    • Generalized ID-based ElGamal signatures 

      Kalkan, S.; Kaya, K.; Selçuk, A.A. (2007)
      ID-based cryptography has been a very active area of research in cryptography since bilinear pairings were introduced as a cryptographic tool, and there have been many proposals for ID-based signatures recently. In this ...
    • Robust threshold schemes based on the Chinese remainder theorem 

      Kaya, K.; Selçuk, A.A. (2008)
      Recently, Chinese Remainder Theorem (CRT) based function sharing schemes are proposed in the literature. In this paper, we investigate how a CRT-based threshold scheme can be enhanced with the robustness property. To the ...
    • Threshold broadcast encryption with reduced complexity 

      Kaşkaloǧlu, K.; Kaya, K.; Selçuk, A.A. (2007)
      Threshold Broadcast Encryption (TBE) is a promising extension of threshold cryptography with its advantages over traditional threshold cryptosystems, such as eliminating the need of a trusted party, the ability of setting ...
    • Threshold cryptography based on Asmuth–Bloom secret sharing 

      Kaya, K.; Selçuk, A. A. (Elsevier Inc., 2007-10-01)
      In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosysterns. To the ...