A New Probabilistic ID-Based Non-interactive Key Sharing Scheme(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
We propose a new probabilistic ID-based non-interactive key sharing scheme that has non-separable secret-key functions and a non-separable common-key function.The proposed scheme uses the calculation over modulo-P, modulo-Q and over integer ring for realizing non-separability.This proposed scheme has a large threshold against linear attack by the collusive entities.
- 社団法人電子情報通信学会の論文
- 2000-01-25
著者
-
Sakai R
Osaka Electro‐communication Univ. Neyagawa‐shi Jpn
-
Sakai Ryuichi
The Author Is With The Department Of Light-wave Science Osaka Electro-communication University
-
Kasahara Masao
Osaka Gakuin Univ. Suita‐shi Jpn
-
MURAKAMI Yasuyuki
the Department of Electronics and Information Science, Kyoto Institute of Technology
-
SAKAI Ryuichi
the Department of Lightwave Sciences, Osaka Electro-Communication University
-
KASAHARA Masao
the Department of Electronics and Information Science, Kyoto Institute of Technology
-
Murakami Y
Forum Advanced Information Technology Murata Machinery Co. Ltd.
-
Kasahara Masao
Department of Faculty of Informatics, Osaka Gakuin University
関連論文
- A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases : Special Section on Cryptography and Information Security
- A New Probabilistic ID-Based Non-interactive Key Sharing Scheme(Special Section on Cryptography and Information Security)
- A New Class of Non-interactive ID-Based Key Sharing Schemes and Its Performances
- An Upper Bound on Frame Error Rate for Generalized Concatenated Convolutional Codes
- A Method for Evaluating Minimum Free Chernov Distance of Trellis-Codes for Discrete Memoryless Channel (Special Section on Information Theory and Its Applications)
- An Upper Bound on Bit Error Rate for Concatenated Convolutional Code
- A Class of Trellis-Codes for Partial Response Channel
- Matched Design Method for Concatenated Trellis-Coded Modulation
- High Rate Binary Coset Code Used for Inner Code
- Multi-Dimensional Block Shaping
- An 8-Dimensional Trellis-Coded 8-PSK with Non-zero Crossing Constraint (Special Section on Information Theory and Its Applications)
- New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem
- A New Product-Sum Public-Key Cryptosystem Using Message Extension(Special Section on Information Theory and Its Applications)
- Some Optimal and Quasi-Optimal Binary Codes from Cyclic Codes over GF (2^m)
- On the Unequal Error Protection Capability of a q-Ary Image 0f a L0W-Rate q^m-Ary Cyclic Code (Special Section on Information Theory and Its Applications)
- New Methods of Generating Primes Secure against Both P - 1 and P + 1 Methods (Special Section on Information Theory and Its Applications)
- Person Authentication Scheme with Image of Face Casted by Light from Various Directions (Special Issue on Biometric Person Authentication)