2007
DOI: 10.1016/j.ins.2007.04.008
|View full text |Cite
|
Sign up to set email alerts
|

Threshold cryptography based on Asmuth–Bloom secret sharing

Abstract: In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 62 publications
(13 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…1. the variant in [7] considers extended Asmuth-Bloom (t + 1, n)-threshold sequences of co-primes instead of Asmuth-Bloom (t + 1, n)-threshold sequences of co-primes, which are simply defined by replacing the Asmuth-Bloom constraint by the following one:…”
Section: The Asmuth-bloom Secret Sharing Scheme and Variationsmentioning
confidence: 99%
See 1 more Smart Citation
“…1. the variant in [7] considers extended Asmuth-Bloom (t + 1, n)-threshold sequences of co-primes instead of Asmuth-Bloom (t + 1, n)-threshold sequences of co-primes, which are simply defined by replacing the Asmuth-Bloom constraint by the following one:…”
Section: The Asmuth-bloom Secret Sharing Scheme and Variationsmentioning
confidence: 99%
“…Moreover, [4] studies the security of the Asmuth-Bloom threshold scheme [1] and also proposes some asymptotically perfect and ideal variants of it. Another variant of the Asmuth-Bloom threshold scheme was proposed in [7] which provides better security than the original Asmuth-Bloom threshold scheme.…”
Section: Introductionmentioning
confidence: 99%
“…This property shows that the probability of computing s ℓ by means of ( 10) is exactly the probability of computing s ℓ by means of (9). Plugging this into the definition of loss of entropy, we obtain that the loss of entropy associated to A in the CRT-DMAS scheme when recovering s ℓ is exactly the loss of entropy associated to A in the Asmuth-Bloom scheme with public shares for the level ℓ.…”
Section: Theorem 2 the Crt-dmas Secret Sharing Scheme Is Asymptotically Ideal With Respect To The Uniform Distribution On The Secret Spacmentioning
confidence: 82%
“…There is one more important property that we need, namely: distinct solutions to (9) leads to the same number of solutions to (10). Let α be the number of solutions to (10) obtained from a solution to (9), Sol(n) be the number of solutions to the system (n) of equations, and Solðn; x ℓ Þ ¼ s ℓ Þ be the number of solutions with x ℓ = s ℓ to the system (n) of equations, where n = 9, 10. Then,…”
Section: Theorem 2 the Crt-dmas Secret Sharing Scheme Is Asymptotically Ideal With Respect To The Uniform Distribution On The Secret Spacmentioning
confidence: 99%
“…A method based on Blakley's concept is proposed in [13]. In the secret sharing scheme presented in [14], Asmuth-Bloom scheme has been used.…”
Section: B Blakley Secret Sharing Schemementioning
confidence: 99%