Presentation 2007-05-18
(k,n) Threshold Schemes Using XOR Operations
Yoshihiro FUJII, Kouya TOCHIKUBO, Norikazu HOSAKA, Minako TADA, Takehisa KATO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We propose a fast (k,n)-threshold scheme using EXCLUSIVE-OR operations. The proposed scheme is ideal and the size of required random numbers meets the lower bound given in. Our construction is general and two previous schemes by Fujii et al and Kurihara et al are obtained as special cases.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) (k,n)-threshold scheme / ideal secret sharing scheme
Paper # ISEC2007-5
Date of Issue

Conference Information
Committee ISEC
Conference Date 2007/5/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) (k,n) Threshold Schemes Using XOR Operations
Sub Title (in English)
Keyword(1) (k,n)-threshold scheme
Keyword(2) ideal secret sharing scheme
1st Author's Name Yoshihiro FUJII
1st Author's Affiliation Advanced IT Laboratory, Toshiba Solutions Corporation()
2nd Author's Name Kouya TOCHIKUBO
2nd Author's Affiliation Department of Mathematical Information Engineering, College of Industrial Technology, Nihon University
3rd Author's Name Norikazu HOSAKA
3rd Author's Affiliation Advanced IT Laboratory, Toshiba Solutions Corporation
4th Author's Name Minako TADA
4th Author's Affiliation Advanced IT Laboratory, Toshiba Solutions Corporation
5th Author's Name Takehisa KATO
5th Author's Affiliation Advanced IT Laboratory, Toshiba Solutions Corporation
Date 2007-05-18
Paper # ISEC2007-5
Volume (vol) vol.107
Number (no) 44
Page pp.pp.-
#Pages 8
Date of Issue