On the security of the threshold scheme based on the chinese remainder theorem

51Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Threshold schemes enable a group of users to share a secret by providing each user with a share. The scheme has a threshold t+1if any subset with cardinality t + 1of the shares enables the secret to be recovered. In 1983, C. Asmuth and J. Bloom proposed such a scheme based on the Chinese remainder theorem. They derived a complex relation between the parameters of the scheme in order to satisfy some notion of security. However, at that time, the concept of security in cryptography had not yet been formalized. In this paper, we revisit the security of this threshold scheme in the modern context of security. In particular, we prove that the scheme is asymptotically optimal both from an information theoretic and complexity theoretic viewpoint when the parameters satisfy a simplified relationship. We mainly present three theorems, the two first theorems strengthen the result of Asmuth and Bloom and place it in a precise context, while the latest theorem is an improvement of a result obtained by Goldreich et al.

Cite

CITATION STYLE

APA

Quisquater, M., Preneel, B., & Vandewalle, J. (2002). On the security of the threshold scheme based on the chinese remainder theorem. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2274, pp. 199–210). Springer Verlag. https://doi.org/10.1007/3-540-45664-3_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free