Presentation | 2004/5/12 Improvements on a Threshold Distributed Version of the Paillier Cryptosystem Takeru ISHIHARA, Hiroshi AONO, Sadayuki HONGO, Junji SHIKATA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Threshold cryptosystems are threshold distributed versions of the public key cryptosystems. Thresh-old cryptosystems enable us to control secret key in a distributed manner. A threshold distributed version of the Paillier's cryptosystem was proposed by Fouque et al. Nevertheless, this scheme is inefficient because of calculation of the AT-th powering for encryption. On the other hand, Catalano et al., Galindo et al. and Kurosawa et al. proposed some improvements of the Paillier's cryptosystem, respectively. In this paper, we propose two threshold cryptosystems based on the ideas of Catalano et al. and Galindo et al., respectively. Our schemes can reduce the cost of calculation in decryption as well as in encryption compared with the previous schemes.Key words |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | threshold cryptosystem / Paillier's cryptosystem / homomorphic / secret sharing scheme |
Paper # | ISEC2004-12 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2004/5/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Improvements on a Threshold Distributed Version of the Paillier Cryptosystem |
Sub Title (in English) | |
Keyword(1) | threshold cryptosystem |
Keyword(2) | Paillier's cryptosystem |
Keyword(3) | homomorphic |
Keyword(4) | secret sharing scheme |
1st Author's Name | Takeru ISHIHARA |
1st Author's Affiliation | NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department() |
2nd Author's Name | Hiroshi AONO |
2nd Author's Affiliation | NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department |
3rd Author's Name | Sadayuki HONGO |
3rd Author's Affiliation | NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department |
4th Author's Name | Junji SHIKATA |
4th Author's Affiliation | Graduate School of Environment and Information Sciences, Yokohama National University |
Date | 2004/5/12 |
Paper # | ISEC2004-12 |
Volume (vol) | vol.104 |
Number (no) | 53 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |