A verifiable secret sharing scheme based on the chinese remainder theorem
dc.citation.epage | 425 | en_US |
dc.citation.spage | 414 | en_US |
dc.contributor.author | Kaya, Kamer | en_US |
dc.contributor.author | Selçuk, Ali Aydın | en_US |
dc.coverage.spatial | Kharagpur, India | |
dc.date.accessioned | 2016-02-08T11:36:16Z | |
dc.date.available | 2016-02-08T11:36:16Z | |
dc.date.issued | 2008-12 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description | Conference name: Conference on Cryptology in India INDOCRYPT 2008: Progress in Cryptology - INDOCRYPT 2008 | |
dc.description | Date of Conference: 14-17 December, 2008 | |
dc.description.abstract | In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure by an attack where the dealer is able to distribute inconsistent shares to the users. Then we propose a new VSS scheme based on the CRT and prove its security. Using the proposed VSS scheme, we develop a joint random secret sharing (JRSS) protocol, which, to the best of our knowledge, is the first JRSS protocol based on the CRT. © 2008 Springer Berlin Heidelberg. | en_US |
dc.description.provenance | Made available in DSpace on 2016-02-08T11:36:16Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 70227 bytes, checksum: 26e812c6f5156f83f0e77b261a471b5a (MD5) Previous issue date: 2008 | en |
dc.identifier.doi | 10.1007/978-3-540-89754-5_32 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/26802 | en_US |
dc.language.iso | English | en_US |
dc.publisher | Springer | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-540-89754-5_32 | en_US |
dc.source.title | Progress in Cryptology - Indocrypt 2008 : 9th International Conference on Cryptology in India | en_US |
dc.subject | Asmuth-Bloom secret sharing scheme | en_US |
dc.subject | Chinese Remainder Theorem | en_US |
dc.subject | Joint random secret sharing | en_US |
dc.subject | Verifiability | en_US |
dc.subject | Blooms (metal) | en_US |
dc.subject | Fluorescent screens | en_US |
dc.subject | Spectrum analyzers | en_US |
dc.subject | Television picture tubes | en_US |
dc.subject | Asmuth-Bloom secret sharing scheme | en_US |
dc.subject | Chinese Remainder Theorem | en_US |
dc.subject | Remainder theorem | en_US |
dc.subject | Visual secret sharing (VSS) scheme | en_US |
dc.subject | Cryptography | en_US |
dc.title | A verifiable secret sharing scheme based on the chinese remainder theorem | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- A verifiable secret sharing scheme based on the chinese remainder theorem.pdf
- Size:
- 221.31 KB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version