Presentation | 1998/7/30 Proactive Secret Sharing without A Mutually Trusted Party : An application for key registry Masayuki Numao, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | With a slight modification of the refreshment protocol of the proactive secret sharing scheme, the implicit secret generation and share distribution are implemented without assistance of a mutually trausted party (MTP). The implicit secret does not exist until actually constructed, yet the public part of secret is easily constructed. This feature is quite adepuate to the key registry application, where the public key is used for encryption of the session key. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Secret Sharing / Secret Distribution / Proactive Security / Key Recovery / Key Registry |
Paper # | ISEC98-18 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1998/7/30(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Proactive Secret Sharing without A Mutually Trusted Party : An application for key registry |
Sub Title (in English) | |
Keyword(1) | Secret Sharing |
Keyword(2) | Secret Distribution |
Keyword(3) | Proactive Security |
Keyword(4) | Key Recovery |
Keyword(5) | Key Registry |
1st Author's Name | Masayuki Numao |
1st Author's Affiliation | Tokyo Research Laboratory, IBM Japan, Ltd.() |
Date | 1998/7/30 |
Paper # | ISEC98-18 |
Volume (vol) | vol.98 |
Number (no) | 227 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |