Paper Abstract and Keywords |
Presentation |
2011-03-04 13:50
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2010-112 ISEC2010-116 WBS2010-91 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
A key distribution scheme (KDS) is a method of distributing secret keys in the network. In the conventional KDS, the security model was defined for collision attack by using the available information of centers and users. In this study, we define a KDS based on a new security model considering leakage of secret information of key distribution centers as well as collusion of centers and users. In our definition of KDS, we derive lower bounds on memory sizes and amount of received information of each entity, and show the concrete construction that meets corresponding lower bounds. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
key distribution scheme / information leakage / optimal construction / unconditionally secure / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 110, no. 442, IT2010-112, pp. 289-294, March 2011. |
Paper # |
IT2010-112 |
Date of Issue |
2011-02-24 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IT2010-112 ISEC2010-116 WBS2010-91 |
Conference Information |
Committee |
ISEC IT WBS |
Conference Date |
2011-03-03 - 2011-03-04 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Osaka University |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
IT |
Conference Code |
2011-03-ISEC-IT-WBS |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers |
Sub Title (in English) |
|
Keyword(1) |
key distribution scheme |
Keyword(2) |
information leakage |
Keyword(3) |
optimal construction |
Keyword(4) |
unconditionally secure |
Keyword(5) |
|
Keyword(6) |
|
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Takahiro Yoshida |
1st Author's Affiliation |
Aoyama Gakuin University (Aoyama Gakuin Univ.) |
2nd Author's Name |
Hajime Jinushi |
2nd Author's Affiliation |
Aoyama Gakuin University (Aoyama Gakuin Univ.) |
3rd Author's Name |
Toshiyasu Matsushima |
3rd Author's Affiliation |
Waseda University (Waseda Univ.) |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2011-03-04 13:50:00 |
Presentation Time |
25 minutes |
Registration for |
IT |
Paper # |
IT2010-112, ISEC2010-116, WBS2010-91 |
Volume (vol) |
vol.110 |
Number (no) |
no.442(IT), no.443(ISEC), no.444(WBS) |
Page |
pp.289-294 |
#Pages |
6 |
Date of Issue |
2011-02-24 (IT, ISEC, WBS) |
|