Presentation 2004/5/12
Improvements on a Threshold Distributed Version of the Paillier Cryptosystem
Takeru ISHIHARA, Hiroshi AONO, Sadayuki HONGO, Junji SHIKATA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Threshold cryptosystems are threshold distributed versions of the public key cryptosystems. Thresh-old cryptosystems enable us to control secret key in a distributed manner. A threshold distributed version of the Paillier's cryptosystem was proposed by Fouque et al. Nevertheless, this scheme is inefficient because of calculation of the AT-th powering for encryption. On the other hand, Catalano et al., Galindo et al. and Kurosawa et al. proposed some improvements of the Paillier's cryptosystem, respectively. In this paper, we propose two threshold cryptosystems based on the ideas of Catalano et al. and Galindo et al., respectively. Our schemes can reduce the cost of calculation in decryption as well as in encryption compared with the previous schemes.Key words
Keyword(in Japanese) (See Japanese page)
Keyword(in English) threshold cryptosystem / Paillier's cryptosystem / homomorphic / secret sharing scheme
Paper # ISEC2004-12
Date of Issue

Conference Information
Committee ISEC
Conference Date 2004/5/12(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Improvements on a Threshold Distributed Version of the Paillier Cryptosystem
Sub Title (in English)
Keyword(1) threshold cryptosystem
Keyword(2) Paillier's cryptosystem
Keyword(3) homomorphic
Keyword(4) secret sharing scheme
1st Author's Name Takeru ISHIHARA
1st Author's Affiliation NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department()
2nd Author's Name Hiroshi AONO
2nd Author's Affiliation NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department
3rd Author's Name Sadayuki HONGO
3rd Author's Affiliation NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department
4th Author's Name Junji SHIKATA
4th Author's Affiliation Graduate School of Environment and Information Sciences, Yokohama National University
Date 2004/5/12
Paper # ISEC2004-12
Volume (vol) vol.104
Number (no) 53
Page pp.pp.-
#Pages 6
Date of Issue