2014
DOI: 10.1080/21642583.2014.985803
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated key distribution using given set of primes for secret sharing

Abstract: In recent years, Chinese remainder theorem (CRT)-based function sharing schemes are proposed in the literature. In this paper, we study systems of two or more linear congruences. When the moduli are pairwise coprime, the main theorem is known as the CRT, because special cases of the theorem were known to the ancient Chinese. In modern algebra the CRT is a powerful tool in a variety of applications, such as cryptography, error control coding, fault-tolerant systems and certain aspects of signal processing. Thre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…For the previously mentioned advantages of ABSS, this paper proposes a new data outsourcing scheme based on ABSS that addresses several security challenges existing in data outsourcing, namely, availability, confidentiality and order preservation efficiently. There are other schemes that offer one [8,9] or two [19,21] of these characteristics, however, our proposed scheme supports all three characteristics in an efficient and computationally less expensive manner.…”
Section: This Paper Proposes a New Data Outsourcing Scheme Based On Amentioning
confidence: 99%
See 1 more Smart Citation
“…For the previously mentioned advantages of ABSS, this paper proposes a new data outsourcing scheme based on ABSS that addresses several security challenges existing in data outsourcing, namely, availability, confidentiality and order preservation efficiently. There are other schemes that offer one [8,9] or two [19,21] of these characteristics, however, our proposed scheme supports all three characteristics in an efficient and computationally less expensive manner.…”
Section: This Paper Proposes a New Data Outsourcing Scheme Based On Amentioning
confidence: 99%
“…The most basic types are the threshold schemes, where only the cardinality of the set of shares matters [19,20]. In other words, given a secret S, and n shares, any set of t out of n shares is a set with the smallest cardinality from which the secret can be recovered [21], in the sense that any set of (t-1) shares is not enough to give S. This is known as a threshold access structure and is also known as (t, n) threshold secret sharing scheme [22]. Several secret sharing schemes have been employed in [2,10,23] to provide data availability for outsourced data.…”
Section: Introductionmentioning
confidence: 99%
“…For the protection of stored private‐key, researchers have exploited a strategy of a secret key‐sharing threshold. Chandramowliswaran et al 37 employed a Chinese‐remainder theory to present a distributed‐based authentication protocol. Their scheme protects the authentication key broadcasting between the authentic center and stakeholder, that is, group‐based communication.…”
Section: Research Backgroundmentioning
confidence: 99%
“…Since the seminal work of Yao, a number of MPC-based digital signature protocols/schemes with different features have been proposed, for example to enable privacy in the signing phases. Some proposed protocols are based on the secret-sharing protocol, where a threshold t is specified such that only t or more shares can sign a message correctly, such as those designed for Schnorr [14,15] and for DSA/ECDSA [16][17][18][19][20]. However, such systems are generally limited to reconstruction of the secret key and the reconstructing party clearly can be targeted by attackers seeking to compromise the process.…”
Section: Introductionmentioning
confidence: 99%