peer reviewedIn this short note, we describe a variant of Shamir's (n, t)-threshold scheme based on elliptic curves. Moreover, we show how pairings of elliptic curves can be used to also provide verifiability for the new elliptic curve based threshold scheme
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Abstract — The concept of proxy multi-signature scheme is first introduced by Yi et al. in 2000. In ...
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A ...
AbstractA multiple secret sharing scheme can share a group of secrets in each sharing session; this ...
Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which...
In 1979 Shamir and Blakley introduced the concept of secret sharing through threshold schemes. Their...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
Abstract—Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) ...
[[abstract]]In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
In recent decades, many researchers have investigated peer-to-peer security and cryptography such as...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Abstract — The concept of proxy multi-signature scheme is first introduced by Yi et al. in 2000. In ...
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A ...
AbstractA multiple secret sharing scheme can share a group of secrets in each sharing session; this ...
Abstract—In this paper, we present a signcryption scheme based on elliptic curve cryptosystem, which...
In 1979 Shamir and Blakley introduced the concept of secret sharing through threshold schemes. Their...
Abstract—A (t,n) threshold authenticated encryption scheme allows more than t signers to generate an...
Abstract—Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) ...
[[abstract]]In this paper, we propose a dynamic threshold and verifiable multi-secret sharing scheme...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
[[abstract]]A multi-secret sharing scheme is a natural generalization of the secret sharing scheme. ...
Over the past fourteen years many different types of systems for sharing a secret have been proposed...
The paper describes an implementation of Shamir secret sharing schemes based on exponentiation in Ga...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
In recent decades, many researchers have investigated peer-to-peer security and cryptography such as...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Abstract — The concept of proxy multi-signature scheme is first introduced by Yi et al. in 2000. In ...
In this paper we describe a simple protocol for secure delegation of the elliptic-curve pairing. A ...