2006
DOI: 10.1007/11745853_6
|View full text |Cite
|
Sign up to set email alerts
|

Linear Integer Secret Sharing and Distributed Exponentiation

Abstract: Abstract. We introduce the notion of Linear Integer Secret-Sharing (LISS) schemes, and show constructions of such schemes for any access structure. We show that any LISS scheme can be used to build a secure distributed protocol for exponentiation in any group. This implies, for instance, distributed RSA protocols for arbitrary access structures and with arbitrary public exponents.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(52 citation statements)
references
References 22 publications
0
52
0
Order By: Relevance
“…There are several distributed signature schemes [26,27,12] have been presented. Our basic scheme improves the state-of-the-art in a few different dimensions.…”
Section: Our Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are several distributed signature schemes [26,27,12] have been presented. Our basic scheme improves the state-of-the-art in a few different dimensions.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Distributed signature [26,27,12], a useful cryptographic primitive in the multi-user setting, which enables a qualified set of participants to jointly generate a signature on a message. Each participant has a share of a (secret) signing key so that she/he can generate a signature fragment for a given message.…”
Section: Introductionmentioning
confidence: 99%
“…Their construction is based on the existence of secure multiplication on linear shares over Z Q , so it works for both multi-party with honest majority and two-party. A simpler setting where only y is private, x and Q are both public, has been considered [5,18].…”
Section: Related Work and Comparisonmentioning
confidence: 99%
“…We suggest an alternative method where our secure computation is based on replicated integer secret sharing suggested by Damgård and Thorbek [13]. Here, the secret is shared additively over the integers, but each player gets several shares.…”
Section: Introductionmentioning
confidence: 99%