scispace - formally typeset
Journal ArticleDOI

Protocols for group oriented secret sharing

Tzonelih Hwang
- 19 Jun 1992 - 
- Vol. 42, Iss: 4, pp 179-182
TLDR
A practical noninteractive scheme is proposed to simultaneously solve several open problems in group oriented cryptography and can be shown to be equivalent to the difficulty of solving the discrete logarithm problem.
About
This article is published in Information Processing Letters.The article was published on 1992-06-19. It has received 4 citations till now. The article focuses on the topics: Ciphertext & Encryption.

read more

Citations
More filters
Journal Article

Authorization-based Group-oriented Secure Broadcasting System

TL;DR: This paper presents an authorization-based group-oriented secure broadcasting sys-tem based on the ID-based system proposed by Tsujii and Itoh, and some possible conspiracy attacks on the proposed system are analyzed.
Journal ArticleDOI

Research note: ID-based group-oriented cryptosystem and its digital signature scheme

TL;DR: An ID-based group-oriented cryptosystem and its digital signature scheme is proposed, where any entity for decrypting or signing a message is dedicated to ''group'', instead of ''individual''.
Proceedings ArticleDOI

Protocols for designing a fast and perfect group-oriented secret key sharing in distributed systems

TL;DR: This paper presents a fast and perfect secret key sharing scheme based on a simple geometric method to solve group-oriented secret sharing problems in distributed systems that can reduce the needed time of sending messages to a group of receivers due to multiplication operations only.
Proceedings ArticleDOI

An efficient and authenticated group-oriented cryptoscheme based on a geometric method in Internet environments

TL;DR: The secure group-oriented communication scheme proposed in this paper incorporates the public-key distribution and the trigonometry concepts as the basic theory and can reduce the computation time needed for securely sending messages to a group of receivers by using multiplication operations instead of modular exponentiation.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book

Information Theory

Robert B. Ash
Proceedings ArticleDOI

How to play ANY mental game

TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.