A public-key threshold cryptosystem based on residue rings

被引:1
作者
Deacon, Stephanie [1 ]
Duenez, Eduardo [2 ]
Iovino, Jose [2 ]
机构
[1] Liberty Univ, 1971 Univ Blvd, Lynchburg, VA 24502 USA
[2] Univ Texas San Antonio, Dept Math, San Antonio, TX 78249 USA
关键词
Threshold cryptosystem; trusted party; residue rings;
D O I
10.1080/09720529.2007.10698139
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We present a generalization of Pedersen's public-key threshold cryptosystem. Pedersen's protocol relies on the field properties of Zp. We generalize the protocol so that the calculations can be performed in residue rings that are not necessarily fields. The protocol presented here is polynomial-time equivalent to Pedersen's.
引用
收藏
页码:559 / 571
页数:13
相关论文
共 5 条
  • [1] Threshold public key cryptosystem for encrypting long messages
    Yang, Guang
    Liu, Jiqiang
    Journal of Computational Information Systems, 2015, 11 (02): : 671 - 681
  • [2] Threshold Cryptosystem Based on Factoring and Discrete Logarithm Problems
    Mohamad, Mohd Saiful Adli
    Ismail, Eddie Shahril
    2013 UKM FST POSTGRADUATE COLLOQUIUM, 2013, 1571 : 1020 - 1023
  • [3] A Threshold Public Key Encryption via Dual Regev Scheme
    Li Z.-P.
    Wang J.-R.
    Zhang W.-Y.
    Ma C.-G.
    Wang, Jiu-Ru (wangjiuru@lyu.edu.cn), 1600, Beijing University of Posts and Telecommunications (43): : 83 - 87
  • [4] Threshold attribute-based signcryption and its application to authenticated key agreement
    Zheng, Haibin
    Qin, Jing
    Hu, Jiankun
    Wu, Qianhong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4914 - 4923
  • [5] Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography
    Feng, Qi
    He, Debiao
    Wang, Huaqun
    Wang, Ding
    Huang, Xinyi
    IET INFORMATION SECURITY, 2020, 14 (06) : 724 - 732