Results 1 - 10
of
314
Allied Agreement with Threshold Cryptography
"... Ally is a framework for building distributed services in a federated architecture. In a federation, nodes may occupy multiple, independent administrative domains, with complex trust relationships, connected by an asynchronous, wide-area network. We present a library that implements Byzantine fault-t ..."
Abstract
- Add to MetaCart
-tolerant agreement, a critical building-block service in robust distributed systems, targeted at the federation model; threshold cryptography improves the basic agreement protocol with proactive, verifiable security and improved resilience to continuous attack. 1
Some Recent Research Aspects of Threshold Cryptography
- In Proc. of the 1st Intl. Information Security Workshop
, 1997
"... In the traditional scenario in cryptography there is one sender, one receiver and an active or passive eavesdropper who is an opponent. Depending from the application the sender or the receiver (or both) need to use a secret key. Often we are not dealing with an individual sender/receiver, but the s ..."
Abstract
-
Cited by 58 (1 self)
- Add to MetaCart
/receiver, but the sender/receiver is an organization. The goal of threshold cryptography is to present practical schemes to solve such problems without the need to use the more general methods of mental games. In this paper we survey some recent research results on this topic. In particular on: DSS based threshold
Comparison of RSA-Threshold Cryptography and ECC-Threshold Cryptography for Small
"... A mobile ad hoc network is a special type of wireless network in which a collection of mobile hosts with wireless network interfaces may form a temporary network. Without the aid of proper fixed infrastructure, providing secure communications is a big challenge. The strength of the security solution ..."
Abstract
- Add to MetaCart
. Hence an attempt has been made in this paper to identity a suitable asymmetric-threshold based cryptosystems for small MANETs. The study focuses on the comparison of Rivest Shamir Adelman-Threshold Cryptography and Elliptic Curve Cryptography Threshold Cryptography in terms of the performance parameters
On the Algorithms Related to Threshold Cryptography Based Network Protocols
, 2010
"... In this paper we analyzed the algorithms related to threshold cryptography based protocols in networks security. We showed the hardness of threshold minimum cut problem, revealed its relationship with two other problems. Two approximation algorithms for threshold minimum cut were presented. We also ..."
Abstract
- Add to MetaCart
In this paper we analyzed the algorithms related to threshold cryptography based protocols in networks security. We showed the hardness of threshold minimum cut problem, revealed its relationship with two other problems. Two approximation algorithms for threshold minimum cut were presented. We also
Key Management and Distribution for Threshold Cryptography Schemes
, 2004
"... This paper discusses some issues that arise with securing ad-hoc networks. In particular, the notion of threshold cryptography is explained and its application in ad-hoc networks, with respect to key management, is shown. Furthermore, the concept of Zero Knowledge Proofs, which constitutes a promisi ..."
Abstract
- Add to MetaCart
This paper discusses some issues that arise with securing ad-hoc networks. In particular, the notion of threshold cryptography is explained and its application in ad-hoc networks, with respect to key management, is shown. Furthermore, the concept of Zero Knowledge Proofs, which constitutes a
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing ⋆
"... Abstract. In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best ..."
Abstract
-
Cited by 9 (2 self)
- Add to MetaCart
Abstract. In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present two novel function sharing schemes, one for the RSA signature and the other for the ElGamal decryption functions, based on the Asmuth-Bloom scheme. To the best
Threshold Cryptography Based on Blakley Secret Sharing
"... Abstract—Function sharing deals with the problem of distribution of the computation of a function (such as decryption or signature) among several parties. The necessary values for the computation are distributed to the participating parties using a secret sharing scheme (SSS). Several function shari ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
sharing schemes have been pro-posed in the literature, with most of them using Shamir secret sharing as the underlying SSS. In this paper, we investigate how threshold cryptography can be conducted with Blakley secret sharing scheme and present a novel function sharing scheme for the RSA cryptosystem
Identity-Based Threshold Cryptography for Electronic Voting
"... Abstract:- Electronic voting protocols are a reasonable alternative to conventional elections. Nevertheless, they are facing an evolution due to its requirements, especially the ones needed to provide full security considered to represent a democratic electronic vote. Different algorithms, based on ..."
Abstract
- Add to MetaCart
on public key schemes, have been proposed in the literature to meet these security requirements. We propose the use of threshold cryptography and bilinear pairings in order to provide the security requirements that an electronic voting protocol must meet, without requiring the entire infrastructure needed
Multi-layer multicast key management with threshold cryptography
"... The problem of distributing multimedia securely over the Internet is often viewed as an instance of secure multicast communication, in which multicast messages are protected by a group key shared among the group of clients. One important class of key management schemes makes use of a hierarchical ke ..."
Abstract
- Add to MetaCart
scheme using threshold cryptography. We describe how the multi-group scheme is adapted to work with secret shares, and compare this scheme with a naïve multi-stream key-management solution by measuring performance across several critical parameters, including tree degree, multi-group size, and number
Threshold cryptography secure against the adaptive adversary, concurrently
, 2000
"... A threshold cryptosystem or signature scheme is a system with n participants where an honest majority can successfully decrypt a message or issue a signature, but where the security and functionality properties of the system are retained even as the adversary corrupts up to t players. We present the ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
A threshold cryptosystem or signature scheme is a system with n participants where an honest majority can successfully decrypt a message or issue a signature, but where the security and functionality properties of the system are retained even as the adversary corrupts up to t players. We present
Results 1 - 10
of
314