Presentation 1998/7/30
Proactive Secret Sharing without A Mutually Trusted Party : An application for key registry
Masayuki Numao,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) With a slight modification of the refreshment protocol of the proactive secret sharing scheme, the implicit secret generation and share distribution are implemented without assistance of a mutually trausted party (MTP). The implicit secret does not exist until actually constructed, yet the public part of secret is easily constructed. This feature is quite adepuate to the key registry application, where the public key is used for encryption of the session key.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Secret Sharing / Secret Distribution / Proactive Security / Key Recovery / Key Registry
Paper # ISEC98-18
Date of Issue

Conference Information
Committee ISEC
Conference Date 1998/7/30(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language ENG
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Proactive Secret Sharing without A Mutually Trusted Party : An application for key registry
Sub Title (in English)
Keyword(1) Secret Sharing
Keyword(2) Secret Distribution
Keyword(3) Proactive Security
Keyword(4) Key Recovery
Keyword(5) Key Registry
1st Author's Name Masayuki Numao
1st Author's Affiliation Tokyo Research Laboratory, IBM Japan, Ltd.()
Date 1998/7/30
Paper # ISEC98-18
Volume (vol) vol.98
Number (no) 227
Page pp.pp.-
#Pages 6
Date of Issue