Now showing items 1-2 of 2

    • Capture resilient ElGamal signature protocols 

      Acan, Hüseyin; Kaya, Kamer; Selçuk, Ali Aydın (Springer, 2006-11)
      One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is ...
    • Threshold cryptography based on asmuth-bloom secret sharing 

      Kaya, Kamer; Selçuk, Ali Aydın; Tezcan, Zahir (Springer, 2006-11)
      In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal ...