Fast interpolating algorithms in cryptography
Abstract
We present two fast polynomial interpolating algorithms with knots generated in a field K by the recurrent formula of the form xf = axj_l + ft (z = 1,2,..,« -1; x0 = . The running time of them is C(n) + 0(n) base operations from K, where C(n) = 0(n\og2 n) denotes the time needed to compute the wrapped convolution in K. Moreover, we give an application of these algorithms to threshold secret sharing schemes in cryptography.
Full Text:
PDFDOI: http://dx.doi.org/10.17951/ai.2006.5.1.37-45
Date of publication: 2006-01-01 00:00:00
Date of submission: 2016-04-27 10:15:46
Statistics
Total abstract view - 327
Downloads (from 2020-06-17) - PDF - 0
Indicators
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 Annales UMCS Sectio AI Informatica
This work is licensed under a Creative Commons Attribution 4.0 International License.