A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES

Volker Müller

2008

Abstract

In this short note, we describe a variant of Shamir’s (n, t )-threshold scheme based on elliptic curves. Moreover, we show how pairings of elliptic curves can be used to also provide verifiability for the new elliptic curve based threshold scheme.

Download


Paper Citation


in Harvard Style

Müller V. (2008). A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 359-362. DOI: 10.5220/0001918303590362

in Bibtex Style

@conference{secrypt08,
author={Volker Müller},
title={A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={359-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001918303590362},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - A SHORT NOTE ON SECRET SHARING USING ELLIPTIC CURVES
SN - 978-989-8111-59-3
AU - Müller V.
PY - 2008
SP - 359
EP - 362
DO - 10.5220/0001918303590362