Practical threshold signatures with linear secret sharing schemes
dc.citation.epage | 178 | en_US |
dc.citation.spage | 167 | en_US |
dc.contributor.author | Bozkurt, İlker Nadi | en_US |
dc.contributor.author | Kaya, Kamer | en_US |
dc.contributor.author | Selçuk, Ali Aydın | en_US |
dc.coverage.spatial | Gammarth, Tunisia | |
dc.date.accessioned | 2016-02-08T12:27:27Z | |
dc.date.available | 2016-02-08T12:27:27Z | |
dc.date.issued | 2009-06 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description | Date of Conference: 21-25 June, 2009 | |
dc.description | Conference name: International Conference on Cryptology in Africa. AFRICACRYPT 2009: Progress in Cryptology | |
dc.description.abstract | Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating parties using a secret sharing scheme (SSS). Several function sharing schemes have been proposed in the literature, with most of them using Shamir secret sharing as the underlying SSS. In this paper, we investigate how threshold cryptography can be conducted with any linear secret sharing scheme and present a function sharing scheme for the RSA cryptosystem. The challenge is that constructing the secret in a linear SSS requires the solution of a linear system, which normally involves computing inverses, while computing an inverse modulo φ(N) cannot be tolerated in a threshold RSA system in any way. The threshold RSA scheme we propose is a generalization of Shoup's Shamir-based scheme. It is similarly robust and provably secure under the static adversary model. At the end of the paper, we show how this scheme can be extended to other public key cryptosystems and give an example on the Paillier cryptosystem. © 2009 Springer Berlin Heidelberg. | en_US |
dc.description.provenance | Made available in DSpace on 2016-02-08T12:27:27Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 70227 bytes, checksum: 26e812c6f5156f83f0e77b261a471b5a (MD5) Previous issue date: 2009 | en |
dc.identifier.doi | 10.1007/978-3-642-02384-2_11 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/28698 | en_US |
dc.language.iso | English | en_US |
dc.publisher | Springer | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1007/978-3-642-02384-2_11 | en_US |
dc.source.title | International Conference on Cryptology in Africa. AFRICACRYPT 2009: Progress in Cryptology | en_US |
dc.subject | Function sharing | en_US |
dc.subject | Linear secret sharing | en_US |
dc.subject | Threshold cryptography | en_US |
dc.subject | Adversary models | en_US |
dc.subject | Paillier cryptosystem | en_US |
dc.subject | Provably secure | en_US |
dc.subject | Public key cryptosystems | en_US |
dc.subject | RSA cryptosystems | en_US |
dc.subject | Secret sharing | en_US |
dc.subject | Secret sharing schemes | en_US |
dc.subject | Sharing schemes | en_US |
dc.subject | Threshold RSA | en_US |
dc.subject | Threshold signature | en_US |
dc.subject | Linear systems | en_US |
dc.subject | Public key cryptography | en_US |
dc.subject | Computer science | en_US |
dc.title | Practical threshold signatures with linear secret sharing schemes | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Practical threshold signatures with linear secret sharing schemes.pdf
- Size:
- 199.9 KB
- Format:
- Adobe Portable Document Format
- Description:
- Full printable version