p.686
p.692
p.698
p.703
p.709
p.713
p.717
p.723
p.729
Shamir Threshold Based Encryption
Abstract:
This paper Shamir threshold scheme based on the protection of private keys, by constructing a Lagrange interpolating polynomial to achieve in the real environment using the key shared information systems, computation and communication in the case of less , the program can prevent the system key is lost, damaged, and from the enemy's attack, reduce the responsibility of the key holder, but also can reduce the success rate of an adversary to decipher the key. An example is the feasibility of the program.
Info:
Periodical:
Pages:
709-712
Citation:
Online since:
March 2011
Authors:
Keywords:
Price:
Сopyright:
© 2011 Trans Tech Publications Ltd. All Rights Reserved
Share:
Citation: