A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
Volker Müller
2008
Abstract
In this short note, we describe a variant of Shamir’s (n, t )-threshold scheme based on elliptic curves. Moreover, we show how pairings of elliptic curves can be used to also provide verifiability for the new elliptic curve based threshold scheme.
DownloadPaper Citation
in Harvard Style
Müller V. (2008). A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 359-362. DOI: 10.5220/0001918303590362
in Bibtex Style
@conference{secrypt08,
author={Volker Müller},
title={A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={359-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001918303590362},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
SN - 978-989-8111-59-3
AU - Müller V.
PY - 2008
SP - 359
EP - 362
DO - 10.5220/0001918303590362