Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In the paper we present a simple threshold decryption system based on the RSA cryptosystem. Our model avoids the application of the Shamir secret sharing protocol and is based only on the Chinese reminder theorem. The flexibility in the threshold level is attained due to the suitable preparation of the input data. The second part of the article describes a modification of the basic model, which admits the sender's impact on the choice of the real receiver's group.
Słowa kluczowe
Rocznik
Tom
Strony
70--73
Opis fizyczny
Bibliogr. 11 poz.
Twórcy
Bibliografia
- [1] B. Nakielski, J. Pomykała, and J. A. Pomykała, “Multi-threshold signature”, J. Telecommun. Inform. Technol., no. 1, pp. 51–55, 2008.
- [2] J. Pomykała and T. Warchoł , “Threshold signatures in dynamic groups ”, in Proc. Fut. Gener. Commun. Netw. 2007, Jeju-Island, Korea, 2007, pp. 32–37.
- [3] J. Pomykała and T. Warchoł , “Dynamic multi-threshold signatures without the trusted dealer”, Int. J. Multimed. Ubiquit. Eng., vol. 3, pp. 31–42, July 2008.
- [4] H. Ghodosi, J. Pieprzyk, and R. Safavi-Naini, “Dynamic threshold cryptosystems: a new scheme in group oriented cryptography”, in Proc. Pragocrypt’96, Prague, Czech Republic, 1996, pp. 370–379.
- [5] R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
- [6] A. Shamir, “How to share a secret”, Commun. ACM, vol. 22, pp. 612–613, 1979.
- [7] B. Nakielski, J. Pomykała, and J. A. Pomykała, “Wykorzystanie deszyfrowania progowego w bazach danych”, Biul. WAT, vol. LVII, no. 4, pp. 183–196, 2008 (in Polish).
- [8] B. Schneier, Applied Cryptography. New York: Wiley, 1996.
- [9] R. Di Pietro, L. V. Mancini, and G. Zanin, Efficient and Adaptive Threshold Signatures for Ad-Hoc Networks. Electronic Notes in Theoretical Computer Science. Amsterdam: Elsevier, 2007, vol. 171, pp. 93–105.
- [10] J. Pomykała and B. Źrałek, “Threshold flexible siganture scheme in dynamic groups”, in Proc. ACS Conf., Międzyzdroje, Poland, 2008.
- [11] T. Tassa, “Hierarchical threshold secret sharing”, J. Cryptol., vol. 20, pp. 237–264, 2007.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT8-0016-0022