Published January 1, 2006
| Version v1
Conference paper
Open
Threshold cryptography based on asmuth-bloom secret sharing
Creators
- 1. Bilkent Univ, Dept Comp Engn, TR-06800 Ankara, Turkey
Description
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects.
Files
bib-0a917596-c9a1-4805-90a9-fa759ad7dfb0.txt
Files
(162 Bytes)
| Name | Size | Download all |
|---|---|---|
|
md5:26929e39025e67699672148a63baa0b6
|
162 Bytes | Preview Download |