#### Filter Results:

- Full text PDF available (6)

#### Publication Year

2006

2009

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek
- CT-RSA
- 2008

- Ivan Damgård, Rune Thorbek
- EUROCRYPT
- 2007

We present two universally composable and practical protocols by which a dealer can, verifiably and non-interactively, secret-share an integer among a set of players. Moreover, at small extra cost and using a distributed verifier proof, it can be shown in zero-knowledge that three shared integers a, b, c satisfy ab = c. This implies by known reductions… (More)

- Ivan Damgård, Rune Thorbek
- Public Key Cryptography
- 2006

We introduce the notion of Linear Integer Secret-Sharing (LISS) schemes, and show constructions of such schemes for any access structure. We show that any LISS scheme can be used to build a secure distributed protocol for exponentiation in any group. This implies, for instance, distributed RSA protocols for arbitrary access structures and with arbitrary… (More)

- Ivan Damgård, Rune Thorbek
- IACR Cryptology ePrint Archive
- 2008

We show how to effectively convert a secret-shared bit b over a prime field to another field. If initially given a random replicated secret share this conversion can be done by the cost of revealing one secret shared value. By using a pseudo-random function it is possible to convert arbitrary many bit values from one initial random replicated share.… (More)

- Rune Thorbek
- 2009

In this work, we introduce the Linear Integer Secret Sharing (LISS) scheme, which is a secret sharing scheme done directly over the integers. I.e., the generation of shares is done by an integer linear combination of the secret and some random integer values. The reconstruction of the secret is done directly by a linear integer combination of the shares of… (More)

- Rune Thorbek
- IACR Cryptology ePrint Archive
- 2009

In [3] Damgard and Thorbek proposed the linear integer secret sharing (LISS) scheme. In this note we show that the LISS scheme can be made proactive.

- Carsten Raskgaard, Rune Thorbek
- 2006

This paper is written in connection with an exam project in the course Mathematical Aspects of Cryptology, spring 2006. It covers the quantum prime factoring algorithm which was first presented by Shor [7]. First, we give the reduction from prime factoring to order finding. Secondly, we present an efficient quantum algorithm for the order finding problem.

- ‹
- 1
- ›