A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES

Volker Müller

Abstract

In this short note, we describe a variant of Shamir’s (n, t )-threshold scheme based on elliptic curves. Moreover, we show how pairings of elliptic curves can be used to also provide verifiability for the new elliptic curve based threshold scheme.

References

  1. Baek, J. and Zheng, Y. (2004). Identity-based threshold decryption. In PKC 2004, LNCS 2947, pages 262- 276.
  2. Certicom (2000). phy, sec 1:
  3. http://www.secg.org/download/aid-385/
  4. CL (2008). The pairing-based crypto lounge, website at http://paginas.terra.com.br/informatica/paulobarreto/pblounge.html.
  5. Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing. In IEEE Symposium on Foundations of Computer Science, pages 427-437.
  6. Galbraith, S., Harrison, K., and Soldera, D. (2002). Implementing the tate pairing. In Algorithmic Number Theory Symposium - ANTS-V, Lecture Notes on Computer Science, volume 2369, pages 324-337. Springer.
  7. Galbraith, S., Hess, F., and Vercauteren, F. (2008). Aspects of pairing inversion. Technical report, Katholieke Universiteit Leuven, available at http://homes.esat.kuleuven.be/~fvercaut/.
  8. Hankerson, D., Menezes, A., and Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer.
  9. Koblitz, N. (1987). Elliptic curve cryptosystems. In Mathematics of Computation, volume 48, pages 203-209.
  10. Liu, S., Chen, K., and Qiu, W. (2007). Identity-based threshold decryption revisited. In ISPEC 2007, LNCS 4464, pages 329-343.
  11. Menezes, A., Oorschot, P., and Vanstone, S. (1997). Handbook of Applied Cryptography. CRC Press.
  12. Shamir, A. (1979). How to share a secret. In Communications of the ACM, volume 22, pages 612-613.
  13. Stoer, J. and Burlirsch, R. (1991). Introduction to Numerical Analysis. Springer.
Download


Paper Citation


in Harvard Style

Müller V. (2008). A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 359-362. DOI: 10.5220/0001918303590362


in Bibtex Style

@conference{secrypt08,
author={Volker Müller},
title={A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={359-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001918303590362},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
SN - 978-989-8111-59-3
AU - Müller V.
PY - 2008
SP - 359
EP - 362
DO - 10.5220/0001918303590362