• No results found

Chinese Remainder Theorem

Threshold cryptography with Chinese remainder theorem

Threshold cryptography with Chinese remainder theorem

... of a polynomial of degree t − 1, and distributed the points on the polynomial to the group of users. Thus, a coalition of size t can recover the polynomial and reveal the key but a smaller coalition can not. This scheme ...

106

Chinese remainder theorem and its applications

Chinese remainder theorem and its applications

... This example is considered the very first application of the Chinese Remainder Theorem ([DPS96]. This kind of computation was also used in building a wall or the base of a house such as the ...

41

Sharing  DSS  by  the  Chinese  Remainder  Theorem

Sharing DSS by the Chinese Remainder Theorem

... [13] B. Pfitzmann and A. Sadeghi. Anonymous fingerprinting with direct non- repudiation. In Proc. of ASIACRYPT 2000, volume 1976 of LNCS, pages 401– 414. Springer-Verlag, 2000. [14] M. Quisquater, B. Preneel, and J. ...

17

Chinese Remainder Theorem in Cryptography a Brief Overview Of

Chinese Remainder Theorem in Cryptography a Brief Overview Of

... The RSA algorithm is an algorithm for public-key cryptography named after Ron Rivest, Adi Shamir and Len Adleman, who invented it in 1977. The RSA algorithm can be used for both public key encryption and digital ...

11

Compartmented  Secret  Sharing  Based  on  the  Chinese  Remainder  Theorem

Compartmented Secret Sharing Based on the Chinese Remainder Theorem

... Moreover, using threshold secret sharing schemes based on the Chinese remainder theorem can lead to further improvements. A compromise between the size of the shares and the level of security must be ...

9

Compartmented  Threshold  RSA  Based  on  the  Chinese  Remainder  Theorem

Compartmented Threshold RSA Based on the Chinese Remainder Theorem

... The correctness and the security of this scheme can be easily proven (see [12]). The threshold secret sharing schemes based on the Chinese remainder theorem can be used in order to decrease the size ...

6

General  Secret  Sharing  Based  on  the  Chinese  Remainder  Theorem

General Secret Sharing Based on the Chinese Remainder Theorem

... 6 Conclusions We have extended the threshold secret schemes based on the Chinese remainder theorem in order to address more general access structures. We have also shown that some access structures ...

15

Quantum Group Signature Scheme Based on Chinese Remainder Theorem

Quantum Group Signature Scheme Based on Chinese Remainder Theorem

... on Chinese Remainder Theorem Xin Sun 1 , Ying Guo 1 , Jinjing Shi 1 , Wei Zhang 1 , Qin Xiao 1 , Moon Ho Lee 2 1 School of Information Science & Engineering, Central South University, Changsha, ...

5

Knapsack  Public-Key  Cryptosystem  Using  Chinese  Remainder  Theorem

Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem

... Takeshi NASAKO † nasako@m.ieice.org Abstract. The realization of the quantum computer will enable to break public- key cryptosystems based on factoring problem and discrete logarithm problem. It is considered that even ...

12

Multicast Authentication Framework for Hierarchical Networks using Chinese Remainder Theorem

Multicast Authentication Framework for Hierarchical Networks using Chinese Remainder Theorem

... on Chinese remainder ...uses Chinese remainder theorem to authenticate the message as well as provide a secure lock over the message so that it can be accessed only by the valid members ...

7

Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks

Enhanced Chinese Remainder Theorem based Broadcast Authentication in Wireless Networks

... Many routing activities and network management activities needed in wireless networks must rely on broadcast authentication mechanisms to ensure that data is being originated from a valid source. Without an efficient ...

5

Reducing Computational Time of Principal Component Analysis with Chinese Remainder Theorem

Reducing Computational Time of Principal Component Analysis with Chinese Remainder Theorem

... Madandola Tajudeen Niyi, Gbolagade Kazeem Alagbe. Reducing Computational Time of Principal Component Analysis with Chinese Remainder Theorem. International Journal of Discrete Mathematics. Vol. 4, ...

7

Rivest Shamir Adleman Encryption Scheme Based on the Chinese Remainder Theorem

Rivest Shamir Adleman Encryption Scheme Based on the Chinese Remainder Theorem

... Abstract: Sensitive information is transmitted across the internet every day and keeping such information as sacred is an important adventure. This is because malicious activities are on the increase as hackers are doing ...

8

Performance Enhancement of Huffman Coding Image Compression with Chinese Remainder Theorem

Performance Enhancement of Huffman Coding Image Compression with Chinese Remainder Theorem

... integrate Chinese Remainder Theorem (CRT) into the Huffman compression algorithm to enhance the speed of compression as against the Traditional Huffman Compression ...Algorithm, Chinese ...

6

General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting

General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting

... nese remainder theorem in order to deal with more general access ...the Chinese remain- der theorem must be used for recovering the ...the Chinese remainder ...

18

A class of principal ideal rings arising from the converse of the
Chinese remainder theorem

A class of principal ideal rings arising from the converse of the Chinese remainder theorem

... Copyright © 2006 Hindawi Publishing Corporation. All rights reserved. 1. Introduction All rings considered in this note are nonzero, commutative, and unital. Our starting point is the following formulation of the ...

5

Efficient RSA Cryptosystem Decryption Based on Chinese Remainder Theorem and Strong Prime

Efficient RSA Cryptosystem Decryption Based on Chinese Remainder Theorem and Strong Prime

... on Chinese Remainder Theorem and Strong ...method, Chinese Remainder Theorem method and Chinese Remainder Theorem and strong prime criterion were used for ...

5

Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N 1024 Bit and 4096 Bit

Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N 1024 Bit and 4096 Bit

... Semarang, 50229, Indonesia Abstract Cryptography has several important aspects in supporting the security of the data, which guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of ...

9

A  Chinese  Remainder  Theorem  Approach  to  Bit-Parallel  GF(2^n)  Polynomial  Basis  Multipliers  for  Irreducible  Trinomials

A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials

... While keeping the time complexity unchanged, this method reduces the XOR gate complexity at the cost of an increase of the AND gates. Therefore, “it is more suitable for ASIC implemen- tations as the area of an XOR gate ...

24

Redundant Residue Number System Based Multiple Error Detection and Correction Using Chinese Remainder Theorem (CRT)

Redundant Residue Number System Based Multiple Error Detection and Correction Using Chinese Remainder Theorem (CRT)

... Abstract: During the last decade information security and reliable communication is unavoidable in information processing. Residue Number Systems (RNS) are still attracting considerable attention from the research ...

9

Show all 10000 documents...

Related subjects