DocumentCode
936259
Title
A modular approach to key safeguarding
Author
Asmuth, Charles ; Bloom, John
Volume
29
Issue
2
fYear
1983
fDate
3/1/1983 12:00:00 AM
Firstpage
208
Lastpage
210
Abstract
A method is proposed for a key safeguarding scheme (threshold scheme) in which the shadows are congruence classes of a number associated with the original key. A variation of this scheme provides efficient error detection and even exposes deliberate tampering. Certain underlying similarities of this scheme with Shamir´s interpolation method make it possible to incorporate these protective features in that method as well.
Keywords
Cryptography; Interpolation; Lagrangian functions; Mathematics; Polynomials; Protection;
fLanguage
English
Journal_Title
Information Theory, IEEE Transactions on
Publisher
ieee
ISSN
0018-9448
Type
jour
DOI
10.1109/TIT.1983.1056651
Filename
1056651
Link To Document