General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting

Threshold secret sharing based on the Chinese remainder theorem has been considered by Mignotte [Mignotte, M., How to share a secret, in: T. Beth, editor, Cryptography-Proceedings of the Workshop on Cryptography, Burg Feuerstein, 1982, Lecture Notes in Computer Science 149 (1983), pp. 371–375] and A...

Full description

Saved in:
Bibliographic Details
Published inElectronic notes in theoretical computer science Vol. 186; pp. 67 - 84
Main Author Iftene, Sorin
Format Journal Article
LanguageEnglish
Published Elsevier B.V 14.07.2007
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Threshold secret sharing based on the Chinese remainder theorem has been considered by Mignotte [Mignotte, M., How to share a secret, in: T. Beth, editor, Cryptography-Proceedings of the Workshop on Cryptography, Burg Feuerstein, 1982, Lecture Notes in Computer Science 149 (1983), pp. 371–375] and Asmuth and Bloom [Asmuth, C.A. and J. Bloom, A modular approach to key safeguarding, IEEE Transactions on Information Theory IT-29 (1983), pp. 208–210]. In this paper we demonstrate that the Chinese remainder theorem can be used for realizing more general access structures, as the compartmented or the weighted threshold ones. We also prove that there exist some non-weighted threshold access structures whose realizations require the general variant of the Chinese remainder theorem, i.e., the variant in which the modules are not necessarily pairwise coprime. As an application of the proposed secret sharing schemes, we present a multi-authority e-voting schemes in which, as a novelty, the tallying authorities may have non-equal weights.
ISSN:1571-0661
1571-0661
DOI:10.1016/j.entcs.2007.01.065