Shamir Threshold Based Encryption

Abstract:

Article Preview

This paper Shamir threshold scheme based on the protection of private keys, by constructing a Lagrange interpolating polynomial to achieve in the real environment using the key shared information systems, computation and communication in the case of less , the program can prevent the system key is lost, damaged, and from the enemy's attack, reduce the responsibility of the key holder, but also can reduce the success rate of an adversary to decipher the key. An example is the feasibility of the program.

Info:

Periodical:

Edited by:

Zhou Mark

Pages:

709-712

DOI:

10.4028/www.scientific.net/AMM.52-54.709

Citation:

X. Y. Gan and B. Liu, "Shamir Threshold Based Encryption", Applied Mechanics and Materials, Vols. 52-54, pp. 709-712, 2011

Online since:

March 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.