A modular approach to key safeguarding
- 1 March 1983
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Theory
- Vol. 29 (2) , 208-210
- https://doi.org/10.1109/tit.1983.1056651
Abstract
A method is proposed for a key safeguarding scheme (threshold scheme) in which the shadows are congruence classes of a number associated with the original key. A variation of this scheme provides efficient error detection and even exposes deliberate tampering. Certain underlying similarities of this scheme with Shamir's interpolation method make it possible to incorporate these protective features in that method as well.Keywords
This publication has 3 references indexed in Scilit:
- One time Pads are Key Safegaurding Schemes, not Cryptosystems. Fast Key Safeguarding Schemes (Threshold Schemes) ExistPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- How to share a secretCommunications of the ACM, 1979
- Explicit Bounds for Some Functions of Prime NumbersAmerican Journal of Mathematics, 1941