2014
DOI: 10.1016/j.cam.2013.05.023
|View full text |Cite
|
Sign up to set email alerts
|

Sharing DSS by the Chinese Remainder Theorem

Abstract: In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmuth-Bloom secret sharing based on the Chinese Remainder Theorem (CRT). To achieve the desired result, we first show how to realize certain other threshold primitives using Asmuth-Bloom secret sharing, such as joint random secret sharing, joint exponential random secret sharing, and joint exponential inverse random secret sharing. We prove the security of our scheme against a static adversary. To the best of our k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Threshold secret sharing scheme provides an effective strategy to protect the security and integrity of information and has become an important branch of the Cryptography. At present, secret sharing technology has been widely used in digital images, electronic voting, digital signatures, and other fields. Current research shows that the secret sharing mechanism can guarantee the integrity, reliability, and security of secrets and enhance the robustness of secret data.…”
Section: Nctc Detection Arithmetic Based On Threshold Secret Sharingmentioning
confidence: 99%
“…Threshold secret sharing scheme provides an effective strategy to protect the security and integrity of information and has become an important branch of the Cryptography. At present, secret sharing technology has been widely used in digital images, electronic voting, digital signatures, and other fields. Current research shows that the secret sharing mechanism can guarantee the integrity, reliability, and security of secrets and enhance the robustness of secret data.…”
Section: Nctc Detection Arithmetic Based On Threshold Secret Sharingmentioning
confidence: 99%
“…Asmuth-Bloom secret sharing scheme is probably the first DSS threshold signature scheme based on Chinese remainder theorem. DSS threshold signature scheme is secure which means is noncounterfeiting in adaptive chosen plain-text attack [9]. Also, linear codes have been used for secret sharing.…”
Section: Secret Sharing Schemementioning
confidence: 99%
“…The Shamir's scheme uses polynomial computations and exponentiations to generate the shares and reconstruct the secret, while the CRT-based approach uses modular exponentiations and reductions. The averaged complexity is O(n.log 2 n) for n participants according to Kaya and Selçuk (2014) and Gennaio et al (1996) and the cost becomes very significant when dealing with large secrets such as images, databases and multimedia contents.…”
Section: Introductionmentioning
confidence: 99%