Fast interpolating algorithms in cryptography

Joanna Kapusta, Ryszard Smarzewski

Abstract


We present two fast polynomial interpolating algorithms with knots generated in a field K by the recurrent formula of the form xf = axj_l + ft (z = 1,2,..,« -1; x0 = . The running time of them is C(n) + 0(n) base operations from K, where C(n) = 0(n\og2 n) denotes the time needed to compute the wrapped convolution in K. Moreover, we give an application of these algorithms to threshold secret sharing schemes in cryptography.

Full Text:

PDF


DOI: http://dx.doi.org/10.17951/ai.2006.5.1.37-45
Date of publication: 2006-01-01 00:00:00
Date of submission: 2016-04-27 10:15:46


Statistics


Total abstract view - 340
Downloads (from 2020-06-17) - PDF - 0

Indicators



Refbacks

  • There are currently no refbacks.


Copyright (c) 2015 Annales UMCS Sectio AI Informatica

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.