In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best of our knowledge, these are the first threshold cryptosystems realized using the Asmuth-Bloom secret sharing. The proposed schemes compare favorably to the earlier function sharing schemes in performance as well as in certain theoretical aspects. © Springer-Verlag Berlin Heidelberg 2006
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
Cataloged from PDF version of article.In this paper, we investigate how threshold cryptography can b...
Function sharing deals with the problem of distribution of the computation of a function (such as de...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
Abstract. A necessary and sufficient condition for the asymptotic idealness of the Asmuth-Bloom thre...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
Abstract—Function sharing deals with the problem of distribution of the computation of a function (s...
In recent decades, many researchers have investigated peer-to-peer security and cryptography such as...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secr...
Cataloged from PDF version of article.In this paper, we investigate how threshold cryptography can b...
Function sharing deals with the problem of distribution of the computation of a function (such as de...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
In this thesis, four different methods for secret sharing with threshold schemes will be investigate...
Abstract. A necessary and sufficient condition for the asymptotic idealness of the Asmuth-Bloom thre...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing...
In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmu...
Abstract—Function sharing deals with the problem of distribution of the computation of a function (s...
In recent decades, many researchers have investigated peer-to-peer security and cryptography such as...
[[abstract]]Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in t...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
A secret sharing scheme derives from a given secret certain shares (or shadows) which are distribute...