2013 10th International Conference on Information Technology: New Generations 2013
DOI: 10.1109/itng.2013.140
|View full text |Cite
|
Sign up to set email alerts
|

A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi Symbol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
1
0
Order By: Relevance
“…The efficiency of its implementation using GMP library [Gt12] is analyzed in [RAL15]. Also a Dynamic Threshold Multi Secret Sharing scheme [RSAB13] and a Signature scheme [Mis14] have been recently published. Other RSA type cryptosystems based on elliptic curves exist, such as [Koy95], [KMOV92], and [Dem94].…”
Section: The Use Of Conic Equations In Cryptographymentioning
confidence: 99%
“…The efficiency of its implementation using GMP library [Gt12] is analyzed in [RAL15]. Also a Dynamic Threshold Multi Secret Sharing scheme [RSAB13] and a Signature scheme [Mis14] have been recently published. Other RSA type cryptosystems based on elliptic curves exist, such as [Koy95], [KMOV92], and [Dem94].…”
Section: The Use Of Conic Equations In Cryptographymentioning
confidence: 99%
“…The main example is provided by elliptic curves over finite fields, whose use in cryptography was introduced, independently, by Koblitz [12] and Miller [17]. Moreover, curves with a group's structure, usually cubics or conics, can be exploited for constructing RSA-like schemes (see, e.g., [4,8,13,19,20,22,23,24]), for improving the performances in the decryption procedures, and having also more security than RSA in some contexts, like broadcast scenarios. Many of these cryptosystems were studied exploiting the properties of the Pell's hyperbola that is the set of solutions in a field F of the famous Pell's equation x 2 −Dy 2 = 1, with D ∈ F * , like in [5], where the authors exhibited an RSA-like cryptosystem over the Pell's hyperbola exploiting multi-factor moduli.…”
Section: Introductionmentioning
confidence: 99%