Javascript must be enabled to continue!
Kriptosistem Multi–RSA
View through CrossRef
Dalam kertas ilmiah ini kami persembahkan kriptosistem multi–RSA. Sistem baru berasaskan RSA ini membenarkan sebarang kombinasi k+1 pelanggan menyahsulit tetapi kurang daripada k+1 pelanggan gagal berbuat demikian. Hal ini dapat dicapai dengan memperkenalkan fungsi aritmetik istimewa yang menjamin ketepatan algoritma penyahsulitan sistem kami.
Kata kunci: Kriptografi; kriptosistem multi-RSA; penyulitan dan penyahsulitan
In this paper we present a multi–RSA cryptosystem. This new system based on RSA allows any k+1 parties to decrypt but less than k+1 parties cannot do so. All these happened by introducing a special arithmetic function, which ensures the exactness of our decryption algorithm.
Key words: Cryptography; multi-RSA cryptosystem; encryption and decryption
Title: Kriptosistem Multi–RSA
Description:
Dalam kertas ilmiah ini kami persembahkan kriptosistem multi–RSA.
Sistem baru berasaskan RSA ini membenarkan sebarang kombinasi k+1 pelanggan menyahsulit tetapi kurang daripada k+1 pelanggan gagal berbuat demikian.
Hal ini dapat dicapai dengan memperkenalkan fungsi aritmetik istimewa yang menjamin ketepatan algoritma penyahsulitan sistem kami.
Kata kunci: Kriptografi; kriptosistem multi-RSA; penyulitan dan penyahsulitan
In this paper we present a multi–RSA cryptosystem.
This new system based on RSA allows any k+1 parties to decrypt but less than k+1 parties cannot do so.
All these happened by introducing a special arithmetic function, which ensures the exactness of our decryption algorithm.
Key words: Cryptography; multi-RSA cryptosystem; encryption and decryption.
Related Results
Postoperative Opioid Dependence in Patients Undergoing Either Total or Reverse Shoulder Arthroplasty for Proximal Humerus Fracture Fixation
Postoperative Opioid Dependence in Patients Undergoing Either Total or Reverse Shoulder Arthroplasty for Proximal Humerus Fracture Fixation
Introduction: In elderly patients who have proximal humerus fractures, treatment commonly involves total shoulder arthroplasty (TSA) or reverse shoulder arthroplasty (RSA). Followi...
RSA versus RSTA : le dilemme entre trappe à pauvreté et trappe à inactivité
RSA versus RSTA : le dilemme entre trappe à pauvreté et trappe à inactivité
Entré en vigueur le 1er janvier 2011 dans les départements d’outre-mer (DOM), le revenu de solidarité active (RSA) se substitue, comme en métropole, au revenu minimum d’insertion e...
Enhanced RSA Algorithm for Data Security in the Internet of Things
Enhanced RSA Algorithm for Data Security in the Internet of Things
Abstract
Various devices are linked together through a variety of networks in order to exchange data in the Internet of Things (IoT). Life has changed dramatically as a res...
Descripción de dos protocolos de velocidades repetidas en futbolistas juveniles
Descripción de dos protocolos de velocidades repetidas en futbolistas juveniles
Introducción: la evaluación del rendimiento físico de futbolistas en edades jóvenes es de gran importancia en el desarrollo del jugador a largo plazo. Objetivo: describir el result...
Optimization of Surface Roughness of Aluminium RSA 443 in Diamond Tool Turning
Optimization of Surface Roughness of Aluminium RSA 443 in Diamond Tool Turning
Context—Rapidly solidified aluminium alloy (RSA 443) is increasingly used in the manufacturing of optical mold inserts because of its fine nanostructure, relatively low cost, excel...
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
Secured Electronic Voting System Using RSA Key Encapsulation Mechanism
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting)...
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
With the growing interest in cryptography --- from students and
researchers as well as from the general public --- there has been a
corresponding increase in the number of cryptogr...
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
<div> The most known of public key cryptosystem was introduced in 1978 by Rivest, Shamir and Adleman [19] and now called the RSA public key cryptosystem in their honor. Later...

