In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax trust assumptions on individual nodes, as well as to introduce a level of fault-tolerance against node compromise. Most threshold cryptography has previously looked at the distribution of public key primitives, particularly threshold signatures and threshold decryption mechanisms. In this paper, we look at the application of threshold cryptography to symmetric primitives, and in particular the encryption or decryption of a symmetric key block cipher. We comment on some previous work in this area and then propose a model for shared encryption / decryption of a block cipher. We will present several ...
We develop a general approach to adding a threshold functionality to a large class of (non- threshol...
A public key encryption cryptography system can be utilized to generate ciphertext of a message usin...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
The power of sharing computation in a cryptosystem is crucial in several real-life applications of c...
With the goal of ensuring availability of security services such as encryption and authentication, w...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secur...
International audienceIn threshold cryptography, private keys are divided into n shares, each one of...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
We develop a general approach to adding a threshold functionality to a large class of (non- threshol...
A public key encryption cryptography system can be utilized to generate ciphertext of a message usin...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...
A threshold signature or decryption scheme is a distributed implementation of a cryptosys-tem, in wh...
The power of sharing computation in a cryptosystem is crucial in several real-life applications of c...
With the goal of ensuring availability of security services such as encryption and authentication, w...
In this paper we apply techniques from secret sharing and threshold decryption to show how to proper...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secur...
International audienceIn threshold cryptography, private keys are divided into n shares, each one of...
Abstract. Threshold cryptography is a fundamental distributed computational paradigm for enhancing t...
There has been renewed attention to threshold signature in recent years as the threshold version of ...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
Abstract. Threshold cryptography aims at enhancing the availability and security of decryption and s...
We develop a general approach to adding a threshold functionality to a large class of (non- threshol...
A public key encryption cryptography system can be utilized to generate ciphertext of a message usin...
Sensitive electronic data must often be kept confidential over very long periods of time. Known solu...