Keyword : secret sharing


Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
Ryo KIKUCHI Koji CHIDA Dai IKARASHI Koki HAMADA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 51-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
passwordauthenticationsecret sharingmultiparty computation
 Summary | Full Text:PDF

On Asymptotically Good Ramp Secret Sharing Schemes
Olav GEIL Stefano MARTIN Umberto MARTÍNEZ-PEÑAS Ryutaroh MATSUMOTO Diego RUANO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2699-2708
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
algebraic geometric codesgeneralized Hamming weightsrelative generalized Hamming weightssecret sharing
 Summary | Full Text:PDF

Wireless Packet Communications Protected by Secret Sharing and Vector Coding
Shoichiro YAMASAKI Tomoko K. MATSUSHIMA Shinichiro MIYAZAKI Kotoku OMURA Hirokazu TANAKA 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2680-2690
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Communication Theory and Systems
Keyword: 
secret sharingphysical layer securitymulti-antenna transmissionvector codingpacket communications
 Summary | Full Text:PDF

Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh MATSUMOTO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2738-2739
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret sharingaccess structurequantum error correction
 Summary | Full Text:PDF

Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets
Wakaha OGATA Toshinori ARAKI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 103-114
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingmulti-secret sharingon-line secret sharingverifiable secret sharingcomputational security
 Summary | Full Text:PDF

A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
Shoichiro YAMASAKI Tomoko K. MATSUSHIMA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 830-838
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network security
Keyword: 
secret sharingphysical layer securitymulti-antenna transmissionReed-Solomon codes
 Summary | Full Text:PDF

Note on Some Recent Cheater Identifiable Secret Sharing Schemes
Rui XU Kirill MOROZOV Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1814-1819
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
secret sharingcheater identifiable secret sharingcryptanalysisReed-Solomon code
 Summary | Full Text:PDF

On the Impossibility of d-Multiplicative Non-perfect Secret Sharing
Maki YOSHIDA Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 767-770
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
secret sharingmultiplicativenon-perfectimpossibility
 Summary | Full Text:PDF

Cheating Detectable Secret Sharing Schemes for Random Bit Strings
Wakaha OGATA Toshinori ARAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/11/01
Vol. E96-A  No. 11 ; pp. 2230-2234
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
secret sharingcheating detection
 Summary | Full Text:PDF

Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes
Masazumi KURIHARA Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/02/01
Vol. E96-A  No. 2 ; pp. 635-648
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
secret sharingsecure regenerating codedistributed storage
 Summary | Full Text:PDF

Batch Logical Protocols for Efficient Multi-Party Computation
Naoto KIRIBUCHI Ryo KATO Tsukasa ENDO Takashi NISHIDE Hiroshi YOSHIURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/10/01
Vol. E95-A  No. 10 ; pp. 1718-1728
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multi-party computationsecret sharingbatch logical protocolsecret shared database
 Summary | Full Text:PDF

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
Chia-Yin LEE Zhi-Hui WANG Lein HARN Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2069-2076
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
key transfer protocolgroup keyDiffie-Hellman key agreementsecret sharing
 Summary | Full Text:PDF

A Simple and Efficient Secret Sharing Scheme Secure against Cheating
Toshinori ARAKI Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1338-1345
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secret sharingcheating detection
 Summary | Full Text:PDF

Provably Secure On-Line Secret Sharing Scheme
Tatsumi OBA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 139-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
secret sharingon-line secret sharingpublic bulletin boardprovably secure
 Summary | Full Text:PDF

Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
Toshinori ARAKI Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 126-135
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
unconditionally secure message transmissionsecret sharing
 Summary | Full Text:PDF

A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI Koichiro WADA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 42-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
secret sharinggame theoryfairnessRSAOAEP
 Summary | Full Text:PDF

A New Secret Sharing Scheme Based on the Multi-Dealer
Cheng GUO Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5 ; pp. 1373-1378
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
secret sharingmulti-dealerfactoring problemdiscrete logarithmthreshold scheme
 Summary | Full Text:PDF

Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison
Takashi NISHIDE Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5 ; pp. 960-968
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
multiparty computationsecret sharingbitwise sharingcomputing with encrypted data
 Summary | Full Text:PDF

Web Metering Scheme Based on the Bilinear Pairings
Narn-Yih LEE Ming-Feng LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/03/01
Vol. E90-D  No. 3 ; pp. 688-691
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographymetering schemesecret sharingbilinear pairingsnetwork security
 Summary | Full Text:PDF

A Tempo-Based t-out-of-n Audio Cryptography Scheme
Shin-Yan CHIOU Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8 ; pp. 2091-2098
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingaudio cryptographydata hiding
 Summary | Full Text:PDF

A Visual Secret Sharing Scheme for Color Images Based on Meanvalue-Color Mixing
Takeru ISHIHARA Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 194-197
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
visual secret sharing schemevisual cryptographysecret sharinggeneral access structure
 Summary | Full Text:PDF

Improvement on the Cheater Identifiable Threshold Scheme
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 957-960
Type of Manuscript:  Special Section LETTER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
information securitysecret sharingauthentication codeerasure decodingcheater
 Summary | Full Text:PDF

Secret Sharing Schemes with Cheating Detection
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/03/01
Vol. E84-A  No. 3 ; pp. 845-850
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingcheating detectionaccess structurethreshold schememultiple assignment scheme
 Summary | Full Text:PDF

An Analytic Construction of the Visual Secret Sharing Scheme for Color Images
Hiroki KOGA Mitsugu IWAMOTO Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 262-272
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingvisual secret sharingvisual cryptologygeneral access structure
 Summary | Full Text:PDF

A Threshold Digital Signature Scheme for a Smart Card Based System
Kunihiko MIYAZAKI Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 205-213
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
threshold digital signaturedigital signaturesecret sharing
 Summary | Full Text:PDF

A Practical (t,n) Multi-Secret Sharing Scheme
Hung-Yu CHIEN Jinn-Ke JAN Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A  No. 12 ; pp. 2762-2765
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysecret sharing
 Summary | Full Text:PDF

A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet
Ching-Yun LEE Yi-Shiung YEH Deng-Jyi CHEN Kuo-Lung KU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/02/25
Vol. E83-D  No. 2 ; pp. 190-199
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
internetsecret sharinggraph theoryspanning treefactoringnetwork reductionprobability
 Summary | Full Text:PDF

Image Size Invariant Visual Cryptography
Ryo ITO Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A  No. 10 ; pp. 2172-2177
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
secret sharingvisual secret sharingvisual cryptography
 Summary | Full Text:PDF

Threshold Key-Recovery Systems for RSA
Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 48-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key recoverykey escrowsecret sharingthreshold scheme
 Summary | Full Text:PDF

A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems
Wei-Bin LEE Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/08/25
Vol. E81-A  No. 8 ; pp. 1733-1738
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingdiscrete logarithmfactoring problemLagrange polynomialdiffie-hellman problem
 Summary | Full Text:PDF

Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray-Scale Images
Hiroki KOGA Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/06/25
Vol. E81-A  No. 6 ; pp. 1262-1269
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingvisual secret sharingvisual cryptography
 Summary | Full Text:PDF

Reliable Broadcasting and Secure Distributing in Channel Networks
Feng BAO Yutaka FUNYU Yukihiro HAMADA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/05/25
Vol. E81-A  No. 5 ; pp. 796-806
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
broadcastingdistributingfault toleranceindependent spanning treesnetworkssecret sharing
 Summary | Full Text:PDF

Analysis on Secret Sharing Schemes with Non-Graphical Access Structures
Koji OKADA Wakaha OGATA Keiichi SAKANO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 85-89
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingshare sizenon-graphical
 Summary | Full Text:PDF

An Efficient Dynamic Threshold Scheme
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/07/25
Vol. E79-D  No. 7 ; pp. 936-942
Type of Manuscript:  PAPER
Category: Software Theory
Keyword: 
secret sharingthreshold schemedynamic threshold schemediscrete logarithm
 Summary | Full Text:PDF

A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme
Shiuh-Jeng WANG Jin-Fu CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 76-85
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
access controlsecurity classgroup-orientedsecret sharing
 Summary | Full Text:PDF