Now showing items 1-5 of 5

    • Function and secret sharing extensions for Blakley and Asmuth-Bloom secret sharing schemes 

      Bozkurt, İlker Nadi (Bilkent University, 2009)
      Threshold cryptography deals with situations where the authority to initiate or perform cryptographic operations is distributed amongst a group of individuals. Usually in these situations a secret sharing scheme is used ...
    • Practical threshold signatures with linear secret sharing schemes 

      Bozkurt I.N.; Kaya, K.; Selçuk, A.A. (2009)
      Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating ...
    • Robust threshold schemes based on the Chinese remainder theorem 

      Kaya, K.; Selçuk, A.A. (2008)
      Recently, Chinese Remainder Theorem (CRT) based function sharing schemes are proposed in the literature. In this paper, we investigate how a CRT-based threshold scheme can be enhanced with the robustness property. To the ...
    • Threshold cryptography based on Asmuth–Bloom secret sharing 

      Kaya, K.; Selçuk, A. A. (Elsevier Inc., 2007-10-01)
      In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosysterns. To the ...
    • Threshold cryptography with Chinese remainder theorem 

      Kaya, Kamer (Bilkent University, 2009)
      Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements ...