A Share-Correctable Protocol for the Shamir Threshod Scheme and Its Application to Participant Enrollment (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
スポンサーリンク
概要
- 論文の詳細を見る
Verifiable secret sharing schemes proposed so far can only allow participants to verify whether their shares are correct or not. In this paper, we propose a new protocol which can allow participants not only to verify the correctness of their shares but also to revise the faulty shares. It is achieved in a cooperative way by participants, but without any assistance from the dealer. This protocol, to the best of our knowledge, is the first one providing such kind of ability. Correcting shares by participants instead of the dealer is important in many situations. In addition, this protocol is also useful for adding new participants without the dealer's assistance.
- 社団法人情報処理学会の論文
- 2005-08-15
著者
-
Okamoto Eiji
Graduate School Of Systems And Information Engineering University Of Tsukuba
-
MIAO Ying
Graduate School of Systems and Information Engineering, University of Tsukuba
-
OKAMOTO Takeshi
Graduate School of Systems and Information Engineering, University of Tsukuba
-
TSO RAYLIN
Graduate School of Systems and Information Engineering, University of Tsukuba
-
Okamoto Eiji
Univ. Tsukuba Tsukuba‐shi Jpn
-
Miao Ying
Graduate School Of Systems And Information Engineering University Of Tsukuba
-
Tso Raylin
Risk Engineering Major Graduate School Of Systems And Information Engineering University Of Tsukuba
-
Okamoto Takeshi
Tsukuba Univ. Technol. Tsukuba‐shi Jpn
-
Okamoto Takeshi
Graduate School Of Medical Professions Kawasaki University Of Medical Welfare
-
Okamoto Eiji
Graduate School Of Systems And Information Engineering Univ. Of Tsukuba
-
Okamoto Takeshi
Graduate School of Materials Science, Nara Institute of Science and Technology, Takayama 8916-5, Ikoma, Nara 630-0192, Japan
関連論文
- Sender Authenticated Key Agreements without Random Oracles
- An ID-SP-M4M Scheme and Its Security Analysis(Signatures,Cryptography and Information Security)
- Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses(Protocol, Cryptography and Information Security)
- A Share-Correctable Protocol for the Shamir Threshod Scheme and Its Application to Participant Enrollment (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- How to Verify the Threshold t of Shamir's (t,n)-Threshold Scheme (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- How to Verify the Threshold t of Shamirs (t, n)-Threshold Scheme
- EFFECTS OF SUPINE FLOATING ON RECTAL TEMPERATURE AND CARDIAC AUTONOMIC NERVOUS SYSTEM ACTIVITY AFTER HIGH AND MODERATE INTENSITY EXERCISE WITH A CYCLE ERGOMETER(Proceedings of The 8^ Asian Federation of Sports Medicine Congress 2005 Tokyo)
- Sender Authenticated Key Agreements without Random Oracles
- Effect of Nitrogen on Electrical and Physical Properties of Polyatomic Layer Chemical Vapor Deposition HfSi_xO_y Gate Dielectrics
- Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
- Universal ηT pairing algorithm over arbitrary extension degree (ワイドバンドシステム)
- Universal ηT pairing algorithm over arbitrary extension degree (情報セキュリティ)
- Universal ηT pairing algorithm over arbitrary extension degree (情報理論)
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
- Effect of Nitrogen on Electrical and Physical Properties of Polyatomic Layer Chemical Vapor Deposition HfSixOy Gate Dielectrics
- How to Verify the Threshold t of Shamir's (t, n)-Threshold Scheme
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks