Published January 1, 2006 | Version v1
Conference paper Open

Threshold cryptography based on asmuth-bloom secret sharing

  • 1. Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey

Description

In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.

Files

bib-0a917596-c9a1-4805-90a9-fa759ad7dfb0.txt

Files (162 Bytes)

Name Size Download all
md5:26929e39025e67699672148a63baa0b6
162 Bytes Preview Download