Shamir Threshold Based Encryption

Article Preview

Abstract:

This paper Shamir threshold scheme based on the protection of private keys, by constructing a Lagrange interpolating polynomial to achieve in the real environment using the key shared information systems, computation and communication in the case of less , the program can prevent the system key is lost, damaged, and from the enemy's attack, reduce the responsibility of the key holder, but also can reduce the success rate of an adversary to decipher the key. An example is the feasibility of the program.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

709-712

Citation:

Online since:

March 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] December J et al, Introducing Java, Java unleased, Ed. Prentice-Hall. Madrid, (1997), pp.3-19.

Google Scholar

[2] G.R. Blakley. Safeguarding Cryptographic Keys. Proceedings of the National Computer Conference, 1979, American Federation of Information Processing Societies, 48, 1979, PP. 313-317.

Google Scholar

[3] Harn L, Hsin W J and Mehta M. Authenticated Diffic-Hellman Key Agreement Protocol Using a Single Cryptographic Assumption, IEEE Proc. –Commun, Vol 152 (2005), pp.404-410.

DOI: 10.1049/ip-com:20041041

Google Scholar

[4] D Chaum, Hvan Antwerpen H. Undeniable signatures. Advances in Cryptology-CRYPTO'89 Proceedings, Springer-Verlag, (1999), pp.212-216.

DOI: 10.1007/0-387-34805-0_20

Google Scholar

[5] C Asmuth, J Bloom, A Modular approach to key safeguarding, IEEE Transactions on Infornation Theory, 29, (1983), pp.208-210.

DOI: 10.1109/tit.1983.1056651

Google Scholar

[6] L. de Moura and N. Bjorner, Z3: An Efficient SMT Solver, in Tools and Algorithms for the Construction and Analysis of Systems, (2008), pp.337-340.

DOI: 10.1007/978-3-540-78800-3_24

Google Scholar

[7] B. Dutertre and L. de Moura, A Fast Linear-Arithmetic Solver for DPLL(T), in Computer Aided Verification, (2006), pp.81-94.

DOI: 10.1007/11817963_11

Google Scholar