Sciweavers

6 search results - page 1 / 2
» Robust Threshold Schemes Based on the Chinese Remainder Theo...
Sort
View
AFRICACRYPT
2008
Springer
13 years 11 months ago
Robust Threshold Schemes Based on the Chinese Remainder Theorem
Kamer Kaya, Ali Aydin Selçuk
ICASSP
2011
IEEE
12 years 8 months ago
A robust quantization method using a robust Chinese remainder theorem for secret key generation
Traditional channel quantization based methods for encryption key generation usually suffer from the quantization error which may decrease the key agreement ratio between authoriz...
Wenjie Wang, Chen Wang, Xiang-Gen Xia
ICICS
2001
Springer
13 years 9 months ago
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
Secure group communication with hierarchical access control refers to a scenario where a group of members is divided into a number of subgroups located at different privilege leve...
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
QUANTUMCOMM
2009
Springer
13 years 11 months ago
Improvement of Lattice-Based Cryptography Using CRT
Abstract. In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method ...
Thomas Plantard, Mike Rose, Willy Susilo
CANS
2008
Springer
111views Cryptology» more  CANS 2008»
13 years 6 months ago
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes
In a (r, n)-threshold secret sharing scheme, no group of (r - 1) colluding members can recover the secret value s. However, the number of colluders is likely to increase over time...
Tiancheng Lou, Christophe Tartary