Presentation 2004-11-08
Threshold Cryptosystems Based on the Paillier's Encryption
Takeru ISHIHARA, Hiroshi AONO, Sadayuki HONGO, Junji SHIKATA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) The threshold cryptosystem is a threshold distributed version of the public key cryptosystem. The threshold cryptosystem is useful to control secret key in a distributed manner. Fouque et al. proposed a threshold distributed version of the Paillier's cryptosystem whose security depends on the integer factoring problem. However, in the scheme, there is powering calculation which cannot be computed beforehand. We propose two threshold cryptosystems based on the idea in a paper by Shoup et al. The first scheme is proven to be IND-TCPA in the random oracle model under Partial Discrete Logarithm Assumption. The second one is shown to be IND-TCCA in the random oracle model under Decisional Small Diffie-Hellman Assumption. In addition, our schemes have advantages over those by Fouque et al. in that: (1) we can compute power calculation beforehand in the encryption; (2) the number of private keys in our scheme can be reduced to half of that of the Fouque et al. schemes.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Threshold Cryptosystem / Paillier's Cryptosystem / Secret Sharing Scheme
Paper # ISEC2004-83,OIS2004-50
Date of Issue

Conference Information
Committee ISEC
Conference Date 2004/11/1(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Threshold Cryptosystems Based on the Paillier's Encryption
Sub Title (in English)
Keyword(1) Threshold Cryptosystem
Keyword(2) Paillier's Cryptosystem
Keyword(3) Secret Sharing Scheme
1st Author's Name Takeru ISHIHARA
1st Author's Affiliation NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department()
2nd Author's Name Hiroshi AONO
2nd Author's Affiliation NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department
3rd Author's Name Sadayuki HONGO
3rd Author's Affiliation NTT DoCoMo,Inc., Security Systems Group, Network Management Development Department
4th Author's Name Junji SHIKATA
4th Author's Affiliation Graduate School of Environment and Information Sciences, Yokohama National University
Date 2004-11-08
Paper # ISEC2004-83,OIS2004-50
Volume (vol) vol.104
Number (no) 421
Page pp.pp.-
#Pages 7
Date of Issue