Paper Abstract and Keywords |
Presentation |
2016-07-15 11:10
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC secure. Our original contribution is that we deal with universal composability of the computational indistinguishability, which cannot be described using a single execution trace, while considering an unbounded number of sessions of the protocols in the presence of active and adaptive adversaries. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Secret-sharing Schemes / Indistinguishability Obfuscation / UC secure / Computational Indistinguishability / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 116, no. 129, ISEC2016-31, pp. 137-143, July 2016. |
Paper # |
ISEC2016-31 |
Date of Issue |
2016-07-07 (ISEC, SITE, ICSS, EMM) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
Conference Information |
Committee |
EMM ISEC SITE ICSS IPSJ-CSEC IPSJ-SPT |
Conference Date |
2016-07-14 - 2016-07-15 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
|
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
security, etc |
Paper Information |
Registration To |
ISEC |
Conference Code |
2016-07-EMM-ISEC-SITE-ICSS-CSEC-SPT |
Language |
English (Japanese title is available) |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation |
Sub Title (in English) |
|
Keyword(1) |
Secret-sharing Schemes |
Keyword(2) |
Indistinguishability Obfuscation |
Keyword(3) |
UC secure |
Keyword(4) |
Computational Indistinguishability |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hui Zhao |
1st Author's Affiliation |
Kyushu University (Kyushu Univ.) |
2nd Author's Name |
Kouichi Sakurai |
2nd Author's Affiliation |
Kyushu University (Kyushu Univ.) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2016-07-15 11:10:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
ISEC2016-31, SITE2016-25, ICSS2016-31, EMM2016-39 |
Volume (vol) |
vol.116 |
Number (no) |
no.129(ISEC), no.130(SITE), no.131(ICSS), no.132(EMM) |
Page |
pp.137-143 |
#Pages |
7 |
Date of Issue |
2016-07-07 (ISEC, SITE, ICSS, EMM) |
|