A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
Volker Müller
2008
Abstract
In this short note, we describe a variant of Shamir’s (n, t )-threshold scheme based on elliptic curves. Moreover, we show how pairings of elliptic curves can be used to also provide verifiability for the new elliptic curve based threshold scheme.
References
- Baek, J. and Zheng, Y. (2004). Identity-based threshold decryption. In PKC 2004, LNCS 2947, pages 262- 276.
- Certicom (2000). phy, sec 1:
- http://www.secg.org/download/aid-385/
- CL (2008). The pairing-based crypto lounge, website at http://paginas.terra.com.br/informatica/paulobarreto/pblounge.html.
- Feldman, P. (1987). A practical scheme for non-interactive verifiable secret sharing. In IEEE Symposium on Foundations of Computer Science, pages 427-437.
- Galbraith, S., Harrison, K., and Soldera, D. (2002). Implementing the tate pairing. In Algorithmic Number Theory Symposium - ANTS-V, Lecture Notes on Computer Science, volume 2369, pages 324-337. Springer.
- Galbraith, S., Hess, F., and Vercauteren, F. (2008). Aspects of pairing inversion. Technical report, Katholieke Universiteit Leuven, available at http://homes.esat.kuleuven.be/~fvercaut/.
- Hankerson, D., Menezes, A., and Vanstone, S. (2004). Guide to Elliptic Curve Cryptography. Springer.
- Koblitz, N. (1987). Elliptic curve cryptosystems. In Mathematics of Computation, volume 48, pages 203-209.
- Liu, S., Chen, K., and Qiu, W. (2007). Identity-based threshold decryption revisited. In ISPEC 2007, LNCS 4464, pages 329-343.
- Menezes, A., Oorschot, P., and Vanstone, S. (1997). Handbook of Applied Cryptography. CRC Press.
- Shamir, A. (1979). How to share a secret. In Communications of the ACM, volume 22, pages 612-613.
- Stoer, J. and Burlirsch, R. (1991). Introduction to Numerical Analysis. Springer.
Paper Citation
in Harvard Style
Müller V. (2008). A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 359-362. DOI: 10.5220/0001918303590362
in Bibtex Style
@conference{secrypt08,
author={Volker Müller},
title={A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={359-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001918303590362},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
SN - 978-989-8111-59-3
AU - Müller V.
PY - 2008
SP - 359
EP - 362
DO - 10.5220/0001918303590362