Keyword : secret sharing


Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation
Naohisa NISHIDA Tatsumi OBA Yuji UNAGAMI Jason PAUL CRUZ Naoto YANAI Tadanori TERUYA Nuttapong ATTRAPADUNG Takahiro MATSUDA Goichiro HANAOKA 
Publication:   
Publication Date: 2020/12/01
Vol. E103-A  No. 12 ; pp. 1367-1380
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
secure computationsecret sharingmachine learningbinarized neural networks
 Summary | Full Text:PDF(3.4MB)

Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares
Mariko FUJII Tomoharu SHIBUYA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-D  No. 1 ; pp. 11-24
Type of Manuscript:  Special Section PAPER (Special Section on Enriched Multimedia — Application of Multimedia Technology and Its Security —)
Category: 
Keyword: 
secret sharingvisual cryptographythreshold visual secret sharing schemeshalftone imageLaplacian filter
 Summary | Full Text:PDF(3.5MB)

Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
Ryo KIKUCHI Koji CHIDA Dai IKARASHI Koki HAMADA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 51-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
passwordauthenticationsecret sharingmultiparty computation
 Summary | Full Text:PDF(1.1MB)

On Asymptotically Good Ramp Secret Sharing Schemes
Olav GEIL Stefano MARTIN Umberto MARTÍNEZ-PEÑAS Ryutaroh MATSUMOTO Diego RUANO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2699-2708
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
algebraic geometric codesgeneralized Hamming weightsrelative generalized Hamming weightssecret sharing
 Summary | Full Text:PDF(354.1KB)

Wireless Packet Communications Protected by Secret Sharing and Vector Coding
Shoichiro YAMASAKI Tomoko K. MATSUSHIMA Shinichiro MIYAZAKI Kotoku OMURA Hirokazu TANAKA 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2680-2690
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Communication Theory and Systems
Keyword: 
secret sharingphysical layer securitymulti-antenna transmissionvector codingpacket communications
 Summary | Full Text:PDF(2.1MB)

Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh MATSUMOTO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12 ; pp. 2738-2739
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret sharingaccess structurequantum error correction
 Summary | Full Text:PDF(134.3KB)

Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets
Wakaha OGATA Toshinori ARAKI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 103-114
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingmulti-secret sharingon-line secret sharingverifiable secret sharingcomputational security
 Summary | Full Text:PDF(354.5KB)

A Security Enhancement Technique for Wireless Communications Using Secret Sharing and Physical Layer Secrecy Transmission
Shoichiro YAMASAKI Tomoko K. MATSUSHIMA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 830-838
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network security
Keyword: 
secret sharingphysical layer securitymulti-antenna transmissionReed-Solomon codes
 Summary | Full Text:PDF(1.6MB)

Note on Some Recent Cheater Identifiable Secret Sharing Schemes
Rui XU Kirill MOROZOV Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1814-1819
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
secret sharingcheater identifiable secret sharingcryptanalysisReed-Solomon code
 Summary | Full Text:PDF(880.7KB)

On the Impossibility of d-Multiplicative Non-perfect Secret Sharing
Maki YOSHIDA Toru FUJIWARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 767-770
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
secret sharingmultiplicativenon-perfectimpossibility
 Summary | Full Text:PDF(257.4KB)

Cheating Detectable Secret Sharing Schemes for Random Bit Strings
Wakaha OGATA Toshinori ARAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/11/01
Vol. E96-A  No. 11 ; pp. 2230-2234
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
secret sharingcheating detection
 Summary | Full Text:PDF(360.8KB)

Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes
Masazumi KURIHARA Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/02/01
Vol. E96-A  No. 2 ; pp. 635-648
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
secret sharingsecure regenerating codedistributed storage
 Summary | Full Text:PDF(356.9KB)

Batch Logical Protocols for Efficient Multi-Party Computation
Naoto KIRIBUCHI Ryo KATO Tsukasa ENDO Takashi NISHIDE Hiroshi YOSHIURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/10/01
Vol. E95-A  No. 10 ; pp. 1718-1728
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multi-party computationsecret sharingbatch logical protocolsecret shared database
 Summary | Full Text:PDF(1.2MB)

Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
Chia-Yin LEE Zhi-Hui WANG Lein HARN Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2069-2076
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
key transfer protocolgroup keyDiffie-Hellman key agreementsecret sharing
 Summary | Full Text:PDF(222.2KB)

A Simple and Efficient Secret Sharing Scheme Secure against Cheating
Toshinori ARAKI Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1338-1345
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secret sharingcheating detection
 Summary | Full Text:PDF(262.7KB)

Provably Secure On-Line Secret Sharing Scheme
Tatsumi OBA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 139-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
secret sharingon-line secret sharingpublic bulletin boardprovably secure
 Summary | Full Text:PDF(389.9KB)

Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
Toshinori ARAKI Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 126-135
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
unconditionally secure message transmissionsecret sharing
 Summary | Full Text:PDF(206.3KB)

A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI Koichiro WADA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 42-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
secret sharinggame theoryfairnessRSAOAEP
 Summary | Full Text:PDF(201.3KB)

A New Secret Sharing Scheme Based on the Multi-Dealer
Cheng GUO Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5 ; pp. 1373-1378
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
secret sharingmulti-dealerfactoring problemdiscrete logarithmthreshold scheme
 Summary | Full Text:PDF(192.1KB)

Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison
Takashi NISHIDE Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5 ; pp. 960-968
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
multiparty computationsecret sharingbitwise sharingcomputing with encrypted data
 Summary | Full Text:PDF(237.5KB)

Web Metering Scheme Based on the Bilinear Pairings
Narn-Yih LEE Ming-Feng LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/03/01
Vol. E90-D  No. 3 ; pp. 688-691
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographymetering schemesecret sharingbilinear pairingsnetwork security
 Summary | Full Text:PDF(80.9KB)

A Tempo-Based t-out-of-n Audio Cryptography Scheme
Shin-Yan CHIOU Chi-Sung LAIH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8 ; pp. 2091-2098
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingaudio cryptographydata hiding
 Summary | Full Text:PDF(902.9KB)

A Visual Secret Sharing Scheme for Color Images Based on Meanvalue-Color Mixing
Takeru ISHIHARA Hiroki KOGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 194-197
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
visual secret sharing schemevisual cryptographysecret sharinggeneral access structure
 Summary | Full Text:PDF(162KB)

Improvement on the Cheater Identifiable Threshold Scheme
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 957-960
Type of Manuscript:  Special Section LETTER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
information securitysecret sharingauthentication codeerasure decodingcheater
 Summary | Full Text:PDF(142.5KB)

Secret Sharing Schemes with Cheating Detection
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/03/01
Vol. E84-A  No. 3 ; pp. 845-850
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingcheating detectionaccess structurethreshold schememultiple assignment scheme
 Summary | Full Text:PDF(178.6KB)

An Analytic Construction of the Visual Secret Sharing Scheme for Color Images
Hiroki KOGA Mitsugu IWAMOTO Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 262-272
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingvisual secret sharingvisual cryptologygeneral access structure
 Summary | Full Text:PDF(348.5KB)

A Threshold Digital Signature Scheme for a Smart Card Based System
Kunihiko MIYAZAKI Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 205-213
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
threshold digital signaturedigital signaturesecret sharing
 Summary | Full Text:PDF(232.8KB)

A Practical (t,n) Multi-Secret Sharing Scheme
Hung-Yu CHIEN Jinn-Ke JAN Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A  No. 12 ; pp. 2762-2765
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysecret sharing
 Summary | Full Text:PDF(132.5KB)

A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet
Ching-Yun LEE Yi-Shiung YEH Deng-Jyi CHEN Kuo-Lung KU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/02/25
Vol. E83-D  No. 2 ; pp. 190-199
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
internetsecret sharinggraph theoryspanning treefactoringnetwork reductionprobability
 Summary | Full Text:PDF(868.1KB)

Image Size Invariant Visual Cryptography
Ryo ITO Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A  No. 10 ; pp. 2172-2177
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
secret sharingvisual secret sharingvisual cryptography
 Summary | Full Text:PDF(466KB)

Threshold Key-Recovery Systems for RSA
Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 48-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key recoverykey escrowsecret sharingthreshold scheme
 Summary | Full Text:PDF(144.7KB)

A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems
Wei-Bin LEE Chin-Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/08/25
Vol. E81-A  No. 8 ; pp. 1733-1738
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingdiscrete logarithmfactoring problemLagrange polynomialdiffie-hellman problem
 Summary | Full Text:PDF(567.6KB)

Proposal of a Lattice-Based Visual Secret Sharing Scheme for Color and Gray-Scale Images
Hiroki KOGA Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/06/25
Vol. E81-A  No. 6 ; pp. 1262-1269
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingvisual secret sharingvisual cryptography
 Summary | Full Text:PDF(678KB)

Reliable Broadcasting and Secure Distributing in Channel Networks
Feng BAO Yutaka FUNYU Yukihiro HAMADA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/05/25
Vol. E81-A  No. 5 ; pp. 796-806
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
broadcastingdistributingfault toleranceindependent spanning treesnetworkssecret sharing
 Summary | Full Text:PDF(1MB)

Analysis on Secret Sharing Schemes with Non-Graphical Access Structures
Koji OKADA Wakaha OGATA Keiichi SAKANO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 85-89
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingshare sizenon-graphical
 Summary | Full Text:PDF(355.7KB)

An Efficient Dynamic Threshold Scheme
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/07/25
Vol. E79-D  No. 7 ; pp. 936-942
Type of Manuscript:  PAPER
Category: Software Theory
Keyword: 
secret sharingthreshold schemedynamic threshold schemediscrete logarithm
 Summary | Full Text:PDF(698.2KB)

A Hierarchical and Dynamic Group-Oriented Cryptographic Scheme
Shiuh-Jeng WANG Jin-Fu CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 76-85
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
access controlsecurity classgroup-orientedsecret sharing
 Summary | Full Text:PDF(794.8KB)