Kaya, KamerSelçuk, Ali AydınTezcan, Zahir2016-02-082016-02-082006-11http://hdl.handle.net/11693/27265Date of Conference: 1-3 November, 2006Conference name:21th International Symposium on Computer and Information Sciences ISCIS 2006: Computer and Information SciencesIn this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects. © Springer-Verlag Berlin Heidelberg 2006.EnglishElectronic document exchangeElectronic document identification systemsElGamal decryptionSecret sharingCryptographyThreshold cryptography based on asmuth-bloom secret sharingConference Paper10.1007/11902140_97