Journal ArticleDOI
Protocols for group oriented secret sharing
TLDR
A practical noninteractive scheme is proposed to simultaneously solve several open problems in group oriented cryptography and can be shown to be equivalent to the difficulty of solving the discrete logarithm problem.About:
This article is published in Information Processing Letters.The article was published on 1992-06-19. It has received 4 citations till now. The article focuses on the topics: Ciphertext & Encryption.read more
Citations
More filters
Journal Article
Authorization-based Group-oriented Secure Broadcasting System
Tzong-Chen Wu,Yuh-Shihng Chang +1 more
TL;DR: This paper presents an authorization-based group-oriented secure broadcasting sys-tem based on the ID-based system proposed by Tsujii and Itoh, and some possible conspiracy attacks on the proposed system are analyzed.
Journal ArticleDOI
Research note: ID-based group-oriented cryptosystem and its digital signature scheme
Tzong-Chen Wu,Ru-Lan Su +1 more
TL;DR: An ID-based group-oriented cryptosystem and its digital signature scheme is proposed, where any entity for decrypting or signing a message is dedicated to ''group'', instead of ''individual''.
Proceedings ArticleDOI
Protocols for designing a fast and perfect group-oriented secret key sharing in distributed systems
Woei-Jiunn Tsaur,Shi-Jinn Horng +1 more
TL;DR: This paper presents a fast and perfect secret key sharing scheme based on a simple geometric method to solve group-oriented secret sharing problems in distributed systems that can reduce the needed time of sending messages to a group of receivers due to multiplication operations only.
Proceedings ArticleDOI
An efficient and authenticated group-oriented cryptoscheme based on a geometric method in Internet environments
TL;DR: The secure group-oriented communication scheme proposed in this paper incorporates the public-key distribution and the trigonometry concepts as the basic theory and can reduce the computation time needed for securely sending messages to a group of receivers by using multiplication operations instead of modular exponentiation.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI
How to play ANY mental game
TL;DR: This work presents a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.
Book
Cryptography and data security
TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.