Threshold Cryptography with Chinese Remainder Theorem a Dissertation Submitted to the Department of Computer Engineering and the Institute of Engineering and Science of Bi̇lkent University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy
نویسندگان
چکیده
THRESHOLD CRYPTOGRAPHY WITH CHINESE REMAINDER THEOREM Kamer Kaya Ph.D. in Computer Engineering Supervisor: Asst. Prof. Dr. Ali Aydın Selçuk August, 2009 Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements of the area. However, no matter which algorithms are used, security depends on the secrecy of a key which is supposed to be only known by the agents in the first place. The requirement of the key being secret brings several problems. Storing a secret key on only one person, server or database reduces the security of the system to the security and credibility of that agent. Besides, not having a backup of the key introduces the problem of losing the key if a software/hardware failure occurs. On the other hand, if the key is held by more than one agent an adversary with a desire for the key has more flexibility of choosing the target. Hence the security is reduced to the security of the least secure or least credible of these agents. Secret sharing schemes are introduced to solve the problems above. The main idea of these schemes is to share the secret among the agents such that only predefined coalitions can come together and reveal the secret, while no other coalition can obtain any information about the secret. Thus, the keys used in the areas requiring vital secrecy like large-scale finance applications and commandcontrol mechanisms of nuclear systems, can be stored by using secret sharing schemes. Threshold cryptography deals with a particular type of secret sharing schemes. In threshold cryptography related secret sharing schemes, if the size of a coalition exceeds a bound t, it can reveal the key. And, smaller coalitions can reveal no information about the key. Actually, the first secret sharing scheme in the literature is the threshold scheme of Shamir where he considered the secret as the constant iv
منابع مشابه
The Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملاثربخشی آموزش ابراز وجود فرهنگمحور بر عزتنفس فرزندان طلاق
Brever, M.M.( 2010).The effects of child gender and child age at the time of parental divorce on the development. COLLEGE OF SOCIAL AND BEHAVIORAL SCIENCES, Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Psychology Educational Track.
متن کاملMathematical Modeling and Experimental Verification of Resonance Energy Transfer
Mathematical Modeling and Experimental Verification of Resonance Energy Transfer Networks: Applications in Cryptography and Biological Sensing by Vishwa Nellore Department of Electrical and Computer Engineering Duke University Date: 11/24/2014 Approved: ___________________________ Christopher Dwyer, Supervisor ___________________________ Alvin Lebeck ___________________________ Jeff Glass _____...
متن کاملDesign, optimization, and applications of few-cycle Ti:Sapphire lasers
Cycle Ti:Sapphire Lasers by Li-Jin Chen B.S., Electrical Engineering, National Taiwan University, 2003 M.S., Electro-Optical Engineering, National Taiwan University, 2005 Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering at the MASSACHUSETTS INSTITUTE OF TECHNOLOG...
متن کاملWangyao Ge's Dissertation
Organic Thin Films Deposited by Emulsion-Based, Resonant Infrared, Matrix-Assisted Pulsed Laser Evaporation: Fundamentals and Applications by Wangyao Ge Department of Electrical and Computer Engineering Duke University Date:_______________________ Approved: ___________________________ Adrienne D. Stiff-Roberts, Supervisor ___________________________ April S. Brown ___________________________ Ri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009