Presentation | 2014-03-07 On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values Miki HOSAKA, Yasushi TAKAMI, Tokutaro YOSHIDA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | When one treats confidential data such as personal information on a life log or an office information system, fulfilling "security triad", namely, Confidentiality, Integrity, and Availability, is an important issue. Secret sharing systems divide an electronic file into some fragment files, each of which has no information about the original file, and it realizes distributed storages under high confidentiality and availability. However, there are still two problems in most current systems: 1. they use pseudorandom number by computation when creating fragment files, 2. the risk of the falsification on fragment files exists depending on the storage environments. In order to solve these problems, we will discuss secret sharing systems which totally use physical random number generator instead of pseudorandom, and the falsification-detection method using hash values. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Secret sharing system / Alteration detection / Hash function |
Paper # | LOIS2013-61 |
Date of Issue |
Conference Information | |
Committee | LOIS |
---|---|
Conference Date | 2014/2/28(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Life Intelligence and Office Information Systems (LOIS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values |
Sub Title (in English) | |
Keyword(1) | Secret sharing system |
Keyword(2) | Alteration detection |
Keyword(3) | Hash function |
1st Author's Name | Miki HOSAKA |
1st Author's Affiliation | NTT Secure Platform Laboratories() |
2nd Author's Name | Yasushi TAKAMI |
2nd Author's Affiliation | NTT Secure Platform Laboratories |
3rd Author's Name | Tokutaro YOSHIDA |
3rd Author's Affiliation | NTT Secure Platform Laboratories |
Date | 2014-03-07 |
Paper # | LOIS2013-61 |
Volume (vol) | vol.113 |
Number (no) | 479 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |