Title :
A modular approach to key safeguarding
Author :
Asmuth, Charles ; Bloom, John
fDate :
3/1/1983 12:00:00 AM
Abstract :
A method is proposed for a key safeguarding scheme (threshold scheme) in which the shadows are congruence classes of a number associated with the original key. A variation of this scheme provides efficient error detection and even exposes deliberate tampering. Certain underlying similarities of this scheme with Shamir´s interpolation method make it possible to incorporate these protective features in that method as well.
Keywords :
Cryptography; Interpolation; Lagrangian functions; Mathematics; Polynomials; Protection;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.1983.1056651