Threshold cryptography based on asmuth-bloom secret sharing
dc.citation.epage | 942 | en_US |
dc.citation.spage | 935 | en_US |
dc.contributor.author | Kaya, Kamer | en_US |
dc.contributor.author | Selçuk, Ali Aydın | en_US |
dc.contributor.author | Tezcan, Zahir | en_US |
dc.coverage.spatial | Istanbul, Turkey | |
dc.date.accessioned | 2016-02-08T11:49:15Z | |
dc.date.available | 2016-02-08T11:49:15Z | |
dc.date.issued | 2006-11 | en_US |
dc.department | Department of Computer Engineering | en_US |
dc.description | Date of Conference: 1-3 November, 2006 | |
dc.description | Conference name:21th International Symposium on Computer and Information Sciences ISCIS 2006: Computer and Information Sciences | |
dc.description.abstract | In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects. © Springer-Verlag Berlin Heidelberg 2006. | en_US |
dc.description.provenance | Made available in DSpace on 2016-02-08T11:49:15Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 70227 bytes, checksum: 26e812c6f5156f83f0e77b261a471b5a (MD5) Previous issue date: 2006 | en |
dc.identifier.doi | 10.1007/11902140_97 | en_US |
dc.identifier.uri | http://hdl.handle.net/11693/27265 | en_US |
dc.language.iso | English | en_US |
dc.publisher | Springer | en_US |
dc.relation.isversionof | https://doi.org/10.1007/11902140_97 | |
dc.source.title | 21th International Symposium on Computer and Information Sciences, ISCIS 2006 | en_US |
dc.subject | Electronic document exchange | en_US |
dc.subject | Electronic document identification systems | en_US |
dc.subject | ElGamal decryption | en_US |
dc.subject | Secret sharing | en_US |
dc.subject | Cryptography | en_US |
dc.title | Threshold cryptography based on asmuth-bloom secret sharing | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Threshold_cryptography_based_on_asmuth_bloom_secret_sharing.pdf
- Size:
- 375.09 KB
- Format:
- Adobe Portable Document Format
- Description: