Paper Abstract and Keywords |
Presentation |
2004-11-08 15:55
A Threshold Cryptosystem Based on the Paillier's Encryption Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.) |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
The threshold cryptosystem is a threshold distributed version of the
public key cryptosystem.
The threshold cryptosystem is useful to control
secret key in a distributed manner.
Fouque et al. proposed a threshold distributed version
of the Paillier's cryptosystem whose security depends on the integer factoring problem.
However, in the scheme, there is powering calculation which cannot be computed beforehand.
We propose two threshold cryptosystems based on the
idea in a paper by Shoup et al.
The first scheme is proven to be IND-TCPA
in the random oracle model
under
Partial Discrete Logarithm Assumption.
The second one is shown to be IND-TCCA in the random oracle model
under Decisional Small Diffie-Hellman Assumption.
In addition, our schemes have advantages over those by Fouque et al. in that
: (1) we can compute power calculation beforehand in the encryption
; (2) the number of private keys in our scheme can be reduced to half of that of the Fouque et al. schemes. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Threshold Cryptosystem / Paillier's Cryptosystem / Secret Sharing Scheme / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 104, no. 421, ISEC2004-83, pp. 35-41, Nov. 2004. |
Paper # |
ISEC2004-83 |
Date of Issue |
2004-11-01 (ISEC, OIS) |
ISSN |
Print edition: ISSN 0913-5685 |
Download PDF |
|
Conference Information |
Committee |
ISEC LOIS |
Conference Date |
2004-11-08 - 2004-11-09 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Osaka Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2004-11-ISEC-OIS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Threshold Cryptosystem Based on the Paillier's Encryption |
Sub Title (in English) |
|
Keyword(1) |
Threshold Cryptosystem |
Keyword(2) |
Paillier's Cryptosystem |
Keyword(3) |
Secret Sharing Scheme |
Keyword(4) |
|
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takeru Ishihara |
1st Author's Affiliation |
NTT DoCoMo,Inc (NTT DoCoMo) |
2nd Author's Name |
Hiroshi Aono |
2nd Author's Affiliation |
NTT DoCoMo,Inc (NTT DoCoMo) |
3rd Author's Name |
Sadayuki Hongo |
3rd Author's Affiliation |
NTT DoCoMo,Inc (NTT DoCoMo) |
4th Author's Name |
Junji Shikata |
4th Author's Affiliation |
Yokohama National University (Yokohama National univ.) |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2004-11-08 15:55:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
ISEC2004-83, OIS2004-50 |
Volume (vol) |
vol.104 |
Number (no) |
no.421(ISEC), no.423(OIS) |
Page |
pp.35-41 |
#Pages |
7 |
Date of Issue |
2004-11-01 (ISEC, OIS) |
|