Keyword : threshold scheme


A Novel Realization of Threshold Schemes over Binary Field Extensions
Jun KURIHARA Tomohiko UYEMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1375-1380
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
threshold schemefinite fieldcompanion matrixexclusive-or
 Summary | Full Text:PDF(275.4KB)

A Fast (k,L,n)-Threshold Ramp Secret Sharing Scheme
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1808-1821
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
secret sharing schemethreshold schemethreshold ramp schemeexclusive-orrandom number
 Summary | Full Text:PDF(396.6KB)

A New Secret Sharing Scheme Based on the Multi-Dealer
Cheng GUO Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5 ; pp. 1373-1378
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
secret sharingmulti-dealerfactoring problemdiscrete logarithmthreshold scheme
 Summary | Full Text:PDF(192.1KB)

On a Fast (k,n)-Threshold Secret Sharing Scheme
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2365-2378
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secret sharing schemethreshold schemeexclusive-orentropyrandom numberideal secret sharing scheme
 Summary | Full Text:PDF(396.3KB)

Security Analysis of a Threshold Access Control Scheme Based on Smart Cards
Gwoboa HORNG Chao-Liang LIU Yao-Te HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2177-2179
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptanalysisaccess controlthreshold schemeimpersonation attack
 Summary | Full Text:PDF(68KB)

Elliptic Curve Cryptosystem on Smart Card Access with Threshold Scheme
Shyi-Tsong WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10 ; pp. 2569-2576
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
cryptosystemelliptic curve cryptographysmart cardthreshold scheme
 Summary | Full Text:PDF(548.8KB)

Secret Sharing Schemes with Cheating Detection
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/03/01
Vol. E84-A  No. 3 ; pp. 845-850
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingcheating detectionaccess structurethreshold schememultiple assignment scheme
 Summary | Full Text:PDF(178.6KB)

Threshold Key-Recovery Systems for RSA
Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 48-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key recoverykey escrowsecret sharingthreshold scheme
 Summary | Full Text:PDF(144.7KB)

An Efficient Dynamic Threshold Scheme
Shin-Jia HWANG Chin-Chen CHANG Wei-Pang YANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/07/25
Vol. E79-D  No. 7 ; pp. 936-942
Type of Manuscript:  PAPER
Category: Software Theory
Keyword: 
secret sharingthreshold schemedynamic threshold schemediscrete logarithm
 Summary | Full Text:PDF(698.2KB)