DocumentCode :
936259
Title :
A modular approach to key safeguarding
Author :
Asmuth, Charles ; Bloom, John
Volume :
29
Issue :
2
fYear :
1983
fDate :
3/1/1983 12:00:00 AM
Firstpage :
208
Lastpage :
210
Abstract :
A method is proposed for a key safeguarding scheme (threshold scheme) in which the shadows are congruence classes of a number associated with the original key. A variation of this scheme provides efficient error detection and even exposes deliberate tampering. Certain underlying similarities of this scheme with Shamir´s interpolation method make it possible to incorporate these protective features in that method as well.
Keywords :
Cryptography; Interpolation; Lagrangian functions; Mathematics; Polynomials; Protection;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.1983.1056651
Filename :
1056651
Link To Document :
بازگشت