Paper 2008/356
Using Commutative Encryption to Share a Secret
Saied Hosseini Khayat
Abstract
It is shown how to use commutative encryption to share a secret. Suppose Alice wants to share a secret with Bob such that Bob cannot decrypt the secret unless a group of trustees agree. It is assumed that Alice, Bob and the trustees communicate over insecure channels. This paper presents a scheme that uses modular exponentiation and does not require key exchange. The security of the scheme rest of the difficulty of the discrete logarithm problem.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Not published elsewhere yet
- Keywords
- secret sharingcommutative cryptography
- Contact author(s)
- shk @ alum wustl edu
- History
- 2008-08-18: received
- Short URL
- https://ia.cr/2008/356
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2008/356, author = {Saied Hosseini Khayat}, title = {Using Commutative Encryption to Share a Secret}, howpublished = {Cryptology {ePrint} Archive, Paper 2008/356}, year = {2008}, url = {https://eprint.iacr.org/2008/356} }